US20050091535A1 - Application identity for software products - Google Patents

Application identity for software products Download PDF

Info

Publication number
US20050091535A1
US20050091535A1 US10/868,183 US86818304A US2005091535A1 US 20050091535 A1 US20050091535 A1 US 20050091535A1 US 86818304 A US86818304 A US 86818304A US 2005091535 A1 US2005091535 A1 US 2005091535A1
Authority
US
United States
Prior art keywords
identity
application
application program
resource
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/868,183
Inventor
Jude Kavalam
Timothy Noonan
Valeriy Tsuryk
Adam Stritzel
David Probert
Eric Li
John Rector
Dragos Sambotin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US10/868,183 priority Critical patent/US20050091535A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KAVALAM, JUDE JACOB, LI, ERIC, NOONAN, TIMOTHY D., PROBERT, DAVID B., RECTOR, JOHN AUSTIN, SAMBOTIN, DRAGOS C., STRITZEL, ADAM, TSURYK, VALERIY
Priority to US10/938,126 priority patent/US20050091655A1/en
Priority to EP04023382A priority patent/EP1526454A3/en
Priority to US10/963,479 priority patent/US20050091192A1/en
Priority to CN200410088300.6A priority patent/CN1617099A/en
Priority to KR1020040084703A priority patent/KR20050039634A/en
Priority to JP2004308916A priority patent/JP2005129063A/en
Publication of US20050091535A1 publication Critical patent/US20050091535A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Definitions

  • Embodiments of the present invention relate to the field of operating systems for computing devices.
  • embodiments of this invention relate to managing the installation, execution, and removal of application programs by the operating system via application identities.
  • a newly-installed application program may overwrite a shared dynamic-link library (DLL) file with an older or newer version needed by the newly-installed application program. If the older or newer file is incompatible with the overwritten file, a currently-installed application program dependent on the overwritten file may crash when attempting to access the overwritten file.
  • DLL shared dynamic-link library
  • operating systems need a means to identify which resources, such as files and system settings, have been created by the operating system itself.
  • the operating system OS wants to identify which runtime objects are executing as the operating system as opposed to executing as a non-OS application. Without identifying the OS runtime objects, the system has a hard time restricting only OS runtime object accesses to system objects such as files.
  • Embodiments of the invention include uniquely identifying an application program or other software product and its associated system objects (e.g., files) to allow an operating system to identify and differentiate between different application programs.
  • the invention includes an improved operating system that dynamically determines and assigns an identity to an application program. The operating system persists the assigned identity for use by the operating system whenever the application program is executed.
  • Embodiments of the invention include methods for determining or assigning application identities such as: (1) direct assignment by a developer or application developer using an application manifest, (2) indirect identity assignment (e.g., through an installation program), (3) assignment based on an assessment of the files comprising the application program (e.g., a “footprint”), and (4) assignment based on an impersonation of one application program by another application program.
  • Various embodiments of the invention ensure the clean uninstallation of an application program from the system, prevent an application program from accessing unauthorized services or performing unauthorized actions, virtualize system resources to better isolate application programs from each other, enable rollback of application impact to the system (e.g., “undo” file type associations), and implement application-based impact tracking of files and system settings.
  • Embodiments of the inventions present a general runtime object management strategy which allows the system and user to configure custom solutions to act on a collection of runtime objects and to associate runtime objects based on common properties.
  • One such property includes the collection of runtime objects that represent an application.
  • Some embodiments of the invention enable the operating system to identify itself, and to associate the operating system identity with its own files, system settings, and other objects. Further, some embodiments of the invention enable the operating system to recognize which runtime objects are executing as the operating system. Other embodiments of the invention create a security system based on application identity instead of or in addition to user identity.
  • a method manages a plurality of applications on a computing system.
  • the method includes assigning an application identity to an application program.
  • the assigned application identity differentiates the application program from other application programs.
  • the method also includes assigning a resource identity to a resource associated with the application program.
  • the method also includes relating the assigned application identity and the assigned resource identity.
  • a method enables an operating system to protect a resource associated therewith from modification by an application program.
  • the method includes assigning an identity to an application program.
  • the method also includes receiving a request from the application program for an operating system resource. Responsive to the received request, the method also determines whether a particular version of the operating system resource exists for the application program based on the identity and provides the application program with the particular version if the particular version exists for the application program. Otherwise, the method generates the particular version and provides the generated, particular version to the application program responsive to the determining.
  • one or more computer-readable media have computer-executable components for managing a plurality of applications on a computing system.
  • the components include a creator component to assign an application identity to an application program.
  • the assigned application identity differentiates the application program from other application programs.
  • the components also include a revision component to assign a resource identity to a resource associated with the application program and an assignment component to relate the assigned application identity and the assigned resource identity.
  • a system manages a plurality of application programs via an application identity associated with each of the plurality of application programs.
  • the system includes an operating system that has an operating system resource associated therewith.
  • the system also includes a memory area to store an application program and an application identity associated therewith.
  • the system also includes a processor programmed to communicate with the operating system and the memory area to receive a request from the application program for the operating system resource and provide, responsive to the received request, a particular version of the operating system resource to the application program based on the application identity.
  • a computer-readable medium stores a data structure representing an identity context associated with a software product.
  • the data structure includes an application identity field storing a value identifying the software product.
  • the data structure also includes an isolation identity field storing a value associated with a group of software products to which the software product belongs.
  • the invention may comprise various other methods and apparatuses.
  • FIG. 1 is an exemplary flow chart illustrating application identity generation by obtaining metadata about an application from different sources.
  • FIG. 2 is an exemplary block diagram illustrating isolation identities.
  • FIG. 3 is an exemplary flow chart illustrating the generation of an application identity and an isolation identity.
  • FIG. 4 is an exemplary block diagram illustrating the generation of an identity context for a file or other resource associated with an application program from components of the application's metadata.
  • FIG. 5 is an exemplary block diagram illustrating the propagation of an identity context during creation of a new file.
  • FIG. 6 is an exemplary block diagram illustrating identity information revision during process creation.
  • FIG. 7 is an exemplary flow chart illustrating the revision of identity information.
  • FIG. 8 is an exemplary block diagram illustrating an architecture for application identity services.
  • FIG. 9 is a block diagram illustrating one example of a suitable computing system environment in which the invention may be implemented.
  • the invention includes assigning a unique identity to each application program or other software product installed or to be installed on a computing device.
  • the invention includes assigning an application identity to the application program and a resource identity to each resource created or associated with the application program.
  • a resource includes, but is not limited to, a file, folder, process, thread, system setting, named object, an application programming interface (API), a specific code path, a library of executable routines, operating system property value, and an operating system resource.
  • API application programming interface
  • a number of APIs and code paths provide send mail capability, and access to these APIs and code paths might be restricted.
  • the ability to reboot the system is restricted.
  • Resources also include the system's name space (e.g., the ‘names’ themselves), not just specific named objects. For example, reserving or ‘squatting’ on a name before an object is created with the name creates both fragility and security issues.
  • the assigned application identity differentiates the application program from other application programs.
  • An embodiment of the invention relates the application identity and the resource identity to enable safe manipulation, extensibility, and integration of the application program and its resources with the operating system.
  • the application identity and resource identity provide uniqueness, consistency, and persistency (i.e., a non-evolving identity).
  • an application identity and resource identity may be explicitly defined by an application manifest or other metadata or may be derived from attributes of the application.
  • the application identity and the resource identity are the same.
  • the invention identifies resources that belong to the operating system.
  • the operating system identity may be explicitly reserved or defined in the operating system manifest or from metadata, or derived during OS installation or execution.
  • identifying an application program and its resources enables users to undo any changes made to a computing device because the changes made by each application program (e.g., interactions with the computing device and resources) are persisted and logged. Further, identifying each application program and its associated resources enables the user to fully remove (e.g., uninstall) the application program and undo any changes made by the application program to the computing device resources.
  • identifying each application program installed or to be installed on a computing device enables the operating system to protect vital resources from accidental or malicious modification by an application installer.
  • the application identities and operating system identity improve the consistency and reliability of the underlying operating system.
  • the invention may also be combined with other protection strategies such as read-only access, isolation, virtualization, change tracking, and sandboxing to provide further protection.
  • embodiments of the invention are not limited to any specific operating system. Rather, embodiments of the invention may be applied to an operating system of any type, model, and configuration. Further, embodiments of the invention are not limited to any of the exemplary methods described herein for assigning identities. Rather, embodiments of the invention are applicable to any method or design for uniquely identifying an application program and its associated resources, as well as identifying the operating system and its associated resources.
  • an exemplary flow chart illustrates a method for generating an application identity for an application program to be installed on a computing device.
  • the method illustrated in FIG. 1 may be performed by an operating system component (e.g., a creator component) or a component not associated with an operating system.
  • an identity driver may be used to provide the identification service illustrated in FIG. 1 .
  • the driver may be configured to scan binary files as part of the installation process to generate application identities and also identify which binary files belong to each other.
  • the flow chart in FIG. 1 illustrates the extraction of metadata from various sources including, but not limited to, a pre-assigned application identity at 102 , a manifest associated with the application program at 104 , and an installation program used to install the application program at 106 .
  • the method extracts the metadata at 108 to determine the application identity. While FIG. 1 illustrates analysis of the sources in a particular order, other orderings are within the scope of the invention.
  • the operation system is configured to scan the deployment package of an application program. A unique signature is then produced from the scan (e.g., by using a hash). The unique signature is used to establish a link with a pre-assigned application identity.
  • the hash includes a sufficiently strong hash to render it probabilistically unlikely that the hash of any two files creates the same signature.
  • the application identity is created by the application developer and is stored in an application manifest.
  • the manifest accompanies the application program when the program is installed.
  • the method determines an application identity from the manifest (e.g., included in a software distribution package) by locating and extracting information specific to the application program.
  • the invention extracts and stores the metadata to determine the application identity for the application program to be installed.
  • application identity is generated from a strong name by hashing the name and the PKH fields.
  • the manifest is a declarative source of the application identity.
  • embodiments of the invention identify the application program by generating a non-declarative application identity.
  • the method generates the application identity information at 110 (including an application identity tag at 112 ) when the installation process begins if the application program does not have an assigned application identity (e.g., an application without a manifest or other predefined mechanism). This may be accomplished by locating and extracting specific information about the application program from the installation package (e.g., vendor, product name, product version, and module checksum). For example, an application suite with a number of different applications may be installed from a single installation program.
  • the installation program may be configured with a single application identity that is applied to all programs installed from the single installation program.
  • a business productivity suite may include an electronic mail program and word processing program, but the installation program may be configured to apply the same application identity to each application being installed because both programs are from the same application suite.
  • the installation program generates comparable identity information from the software product footprint. For example, different versions of the same application will have a different footprint, resulting in different application identities.
  • a setup file (e.g., setup.ini) may be part of the software product deployment package.
  • the setup.ini file includes information for an installation bootstrapper component (e.g., setup.exe) to perform.
  • a property such as AppName in a specific section (e.g., Startup) of the setup.ini file may include the name of the product.
  • file version information resources may include entries such as CompanyName and ProductName.
  • the values for these entries are used as product vendor and product name attribute values.
  • the information is extracted with functions such as GetFileVersionlnfo( ) and VerQueryValue( ).
  • the first half of the structure stores hash values generated from the identified vendor name and product name.
  • the determined and generated identity information is stored (e.g., persisted) at 114 for future use (e.g., by the underlying operating system).
  • Application programs include computer programs or pieces of software designed to perform one or more specific tasks or functions.
  • An application program as perceived by a user may actually be a collection of components including, but not limited to, executable modules, dynamic libraries, resources, and supplementary files logically or functionally grouped to perform the set of specific tasks.
  • the components may be bound together explicitly and implicitly to form the application program. Some of the components of an application program may have a hard dependency on each other. Some application components may be shared with other applications.
  • the application program may have routines imported from other modules during a process referred to as “binding.” For example, in a portable executable file format, an import section defines the routines, modules, variables, and other symbols the loader should locate and link to create the application program.
  • references to all the external assemblies used by the application program are listed in a manifest included within an assembly dynamic-link library (DLL) or supplied externally to service multiple DLLs.
  • DLL assembly dynamic-link library
  • Implicit dependencies are typically not regulated by any data structure within file formats.
  • One module may depend on a symbol exported from another module, but the binding happens in runtime when a host module dynamically loads the other module.
  • a host module requests creation of an object instance and requests a reference to the module which provides the implementation for the object.
  • a component may rely on data stored within a non-executable file such as a bitmap, an icon, video, and sound.
  • Embodiments of the invention include methods for identifying the explicit and implicit module dependencies to enable identification of an application program in various ways.
  • the components that form an application program are grouped together by the application vendor into one deployment package.
  • the methods include using the deployment package to track the files created and system settings stored during installation to identify the files belonging to a specific application program.
  • the methods assign an identity to each of the files created by the application. The identity is associated with the application identity of the application program as illustrated in FIG. 4 .
  • an isolation identity is assigned to an application program in addition to an application identity by an operating system component (e.g., a group component) according to the invention. While the isolation identity may be associated with just this application, the isolation identity may also be associated with another application program having another application identity associated therewith.
  • the isolation identity may be used to logically group application programs with different application identities.
  • the application programs may have a common context (e.g., installed by a particular user). For example, if two application programs from the same application suite have different application identities, the operating system assigns the same isolation identity to both application programs.
  • Some or all of the information gathered to generate the application identities may be used to group the applications into isolation identities based on analogous characteristics. For example, embodiments of the invention may use the vendor name, product name, and/or a signature of the binary content of the module to generate the isolation identity.
  • an isolation identity is generated by obtaining module metadata or other attributes. Based on the type of the module and functional designation there are various ways for the module vendor (e.g., developer) to associate metadata with the module.
  • the metadata may be part of the physical file representing the module or stored in a separate file or files.
  • the application programs assigned to a specific isolation identity create a virtual program group. All applications programs in the virtual program group receive the equivalent virtualized view of the operating system (e.g., the same level of access to system resources). That is, different applications with the same isolation identity share the same virtualized view of the system. In an example in which different versions of the same application program are assigned different application identities, the different versions may be assigned the same isolation identity because the different versions are to receive equivalent access to system resources.
  • An operating system provides access control for its resources via the application identities and/or the isolation identities.
  • the operating system may maintain multiple copies and/or versions of the same file (e.g., virtual copies) with potentially different access rights with respect to an application.
  • the operating system dynamically virtualizes a file requested by an application program with a specific isolation identity for write access.
  • all products from different vendors and different products from the same vendor have different virtualized views while all versions of the same product from the same vendor share the same virtualized view.
  • the comparison of the vendor names and product names may be based on the case insensitive string values for the vendor name and product name attributes.
  • an exemplary block diagram illustrates the use of isolation identities.
  • an application program with application identity ID 1 and an application with application identity ID 2 have the same isolation identity IsoID 1 .
  • An application program with application identity ID 3 has isolation identity IsoID 2 .
  • An operating system 202 maintains two copies of File A: one copy 204 of File A for write access by applications with IsoID 1 (e.g., application programs ID 1 and ID 2 ), and one copy 206 of File A for write access by applications with IsoID 2 (e.g., application program ID 3 ).
  • a component of an operating system 202 receives a request from application program ID 1 for File A.
  • the request includes the assigned identity ID 1 and IsoID 1 .
  • the operating system 202 infers the assigned identity ID 1 and IsoID 1 or queries the application program ID 1 for the assigned identity ID 1 and IsoID 1 . Responsive to the received request, the operating system 202 determines whether a particular version of the operating system resource exists for the application program based on the received identity. In this case, the copy 204 of File A exists for the identity IsoID 1 .
  • the operating system 202 provides the application program ID 1 with the copy 204 of File A exists for IsoID 1 . If the copy 204 of File A for IsoID 1 did not exist, the operating system 202 would generate the copy from original File A and provide the generated copy to application program ID 1 .
  • FIG. 3 a flow chart illustrates an exemplary method for determining an application identity and an isolation identity of a module during runtime.
  • an operating system or client server runtime process executes the functions illustrated in FIG. 3 .
  • a parent process spawns a child process by, for example, invoking a function such as CreateProcess( ). If the application identity and the isolation identity for the module associated with the child process exist, the method loads the identities from the identity store and assigns the identities to the process along with other runtime data. If the identities do not exist, the method performs various operations to determine and assign the identities. For example, the method consults a manifest and loads the identities from the manifest if the manifest contains the identities.
  • the method may also consult application compatibility data and installation program data to obtain information about the module.
  • the method may further extract version information from the module or compute a checksum to determine the application identity and isolation identity.
  • the method stores the determined identities for future use (e.g., as a globally unique sixteen byte data structure).
  • the application identity and the isolation identity may be combined to form an identity context associated with an application program or a module therein.
  • the identity tag for a module or component persists the application's identity context.
  • the identity context may also include one or more flags to store additional information such as attributes associated with the methods of generating the application identity and the isolation identity.
  • the flags may include an installer bit that indicates that the metadata used to generate the application identity and the isolation identity was extracted from a module identified as a known installer.
  • an exemplary block diagram illustrates the structure and generation of an identity tag for a file associated with an application program.
  • Embodiments of the invention include methods for using an identity context associated with an application program to create an identity tag for each file or other resource created or modified by the application program.
  • the identity context is persisted within a store using kernel tagging services. For example, the identity context may be persisted within a file stream or a file attribute.
  • the identity tag for a file or other component includes a creator context formed during creation of the file (e.g., CreateFile( )) and a revised context formed during process creation (e.g., CreateProcess( )).
  • the file tag may only have a creator context until process creation for the file during which the identity is elaborated or revised.
  • FIG. 5 an exemplary block diagram illustrates the propagation of an identity context during file creation.
  • Process 1 creates File A.
  • the revised ID context from the identity of Process 1 forms the creator ID context portion of the identity tag File A, while the revised ID context for File A remains empty.
  • FIG. 6 a block diagram illustrates elaboration of the identity context for a module such as File A during process creation for the module to create the revised identity context.
  • a module such as File A
  • embodiments of the invention determine if there is a creator identity context associated with the module. If there is a creator identity context, the identity context is elaborated to create a revised context and persist it in the tag.
  • the revised identity context is associated with the run-time data about the module stored, for example, by the operating system.
  • embodiments of the invention determine an identity and form the creator context and the revised context.
  • the created identity context is persisted in the file's tag for future execution of the module.
  • Revising the identity context includes using heuristic algorithms and checking signatures with a pre-populated library of application identities (e.g., inherited identity context). Further, elaboration methods include analyzing the revised context of the parent process, the creator context of the module (e.g., File A), and the module itself (e.g., File A) to generate the revised context of the module. In one example, the creator context for the module is copied into the revised context if the module does not have a declarative identity. In another example, the value for the revised context is derived from the module or metadata if the module has a declarative identity.
  • a generic system utility executes without an identity but derives an identity from the first non-system library that it loads.
  • an exemplary flow chart illustrates the revision of identity information during process creation.
  • An embodiment of the invention includes components for revising (e.g., a revision component) the identity context and relating (e.g., an assignment component) the revised identity context to the application identity.
  • the method illustrated in FIG. 7 is performed by a single operating system component. The method includes obtaining the identity context for the module being executed at 702 and the parent process at 704 . If the module has a revised identity context at 706 , the revised identity context is returned for the process at 708 .
  • the method forms the revised context of the module's identity context from the declarative identity at 712 . If the declarative identity does not exist at 710 , but the module is a known installer at 714 , the method forms the revised context from the module metadata at 726 . If the module is not a known installer at 714 , but is a known shared installer engine at 716 , the method determines if the identity context should be derived from the startup environment at 718 .
  • a declarative identity e.g., a manifest
  • the method forms the revised context from the process startup environment (e.g., the files referenced in the command line) at 720 . If the identity context does not need to be derived from the startup environment at 718 , the method determines whether the parent process identity context is the same as the system identity context at 722 . If the parent process identity context is different from the system identity context at 722 , the method copies the parent process context into the module identity context at 724 . If the parent process identity context is the same as the system identity context at 722 , the method forms the revised context from the module metadata at 726 .
  • the process startup environment e.g., the files referenced in the command line
  • the method forms the revised context from the creator context at 730 . If the module's creator identity context does not have a “created by installer” flag at 728 , the method forms the revised context from the module metadata at 726 . The method returns the revised identity context for the new process at 732 .
  • the assigned identity context for a module may be tagged for re-assignment.
  • a subsequent attempt to create a process on the module prompts an embodiment of the invention to generate and assign a new identity.
  • information is persisted to enable reverse-engineering and disaster recovery of the file/process creation hierarchy. Such information may include a system-wide cache of each module and its identity tag.
  • a manifest is automatically generated and updated with identity context data for each module.
  • Embodiments of the invention may be configured to provide a runtime service (e.g., an impersonation component) to transition an application identity from one application to another.
  • the runtime service enables an application to acquire the identity of another application for performing work on behalf of an application after the completion of which the original identity is restored.
  • Access control may be implemented to enable only selected application programs to impersonate other application programs. For example, the requestor's rights are checked against a security descriptor of the target process or token.
  • Embodiments of the invention also provide implicit impersonation.
  • implicit impersonation the system overrides the identity contexts obtained from the identity tag and assigns different contexts based on other information about the process module. For example, a parent process instantiates an object within a context of the local server. The server thread is assigned the same identity context as the parent process that initiated the object instantiation.
  • explicit impersonation includes assigning the identity of a parent “bootstrapper” process to another process if the other process is a known shared installer engine.
  • Embodiments of the invention grant security rights to an application by associating the rights with the application's identity and the identity of the user that is running the application.
  • Application-specific security rights can be associated with a running application by adding an application-specific Security ID (APP-SID) to the security token associated with processes and services that execute on behalf of the application.
  • APP-SID application-specific Security ID
  • Access control lists (ACLs) associated with operating system objects include access rights with respect to APP-SIDs as well as security identifiers for users.
  • the access checks in a security monitor of the invention consider multiple SIDs when deciding to grant access.
  • APP-SIDs introduce at least one new SID to compute against the access rights granted by the ACL.
  • an access request may have more than one APP-SID associated with the request.
  • APP-SIDs in a typical security monitor interpret multiple SIDS in one of several ways as specified by the ACL itself: grant access according to the intersection of privileges of all the SIDs presented (e.g., the least common) or grant access according to the union of the access rights of the SIDs.
  • Computing the intersection of the SIDs may occur when a user has access to an object, but does not want to grant that access to an application.
  • computing the intersection of the SIDs may occur when an application has access to an object but doesn't want to grant access unless the user (or all other applications) also has access.
  • One use of intersection restricts the access of an application downloaded from the network so that it only has access to certain files that are accessible by the user.
  • Granting access according to the union interpretation allows an application to acquire additional access that the user may not possess.
  • a user may not have access to a system service to change the date in the system clock. But the user may have access to a service which has an APP-SID that does allow the date to be changed.
  • the advantage is that the accessible service provides more limited functionality than the underlying service for changing the date, such as only allowing date changes that fall within a limited range.
  • APP-SIDs allow such intermediate service to be written.
  • Some embodiments use other combinations of access checks, such as respecting the DENY Access Control Entry (ACE) in an Access Control List to deny access even if GRANT access is computed by union.
  • Other embodiments may treat application and user SIDS differently, using the GRANT/DENY ACEs associated with an APP-SID to grant or deny additional privileges to a user's SID with respect to an object.
  • ACE DENY Access Control Entry
  • the application identity may also be used to associate generalized privileges (e.g., capabilities) with an application.
  • Capabilities differ from ACL-based security in that a capability is not checked against an access list associated with an object but is instead explicitly checked for by code in key system paths.
  • a capability e.g., send mail
  • Application identities and isolation identities provide a framework to manage the manner in which an operating system provides services to applications that are installed on the system.
  • the services may be provided based on application identities or isolation identities.
  • An embodiment of the invention uses a storage system for the application identities and/or the isolation identities along with an application programming interface (API) that provides access to the identity information during runtime.
  • API application programming interface
  • the service provider may be able to acquire the identity of the application to be serviced regardless of the runtime state (i.e., whether the application is running or not) to perform the actions over the application process or the files or resource set belonging to the applications.
  • Software application identities allow the system to recognize an application as one entity and provide services to it. Determining and assigning non-declarative identities enables the operation system to automatically recognize every application installed and to be installed on the system. The precise and reliable identification of the software deployment package is an important for early detection and population of the identities of the application programs associated with the package.
  • the concept of providing services to the application expands and generalizes the software administration process from the servicing of different applications each with individual activities to the common set of actions from the operating system toward the software loaded.
  • each application has its own identification information. There is a class of tasks to be performed by one application on behalf of another. The most typical example is administration and maintenance. Embodiments of the invention allow the administrative tools and utilities to impersonate the servicing application.
  • a set denotes a container object which contains runtime entity members, such as processes, threads, and other sets.
  • the members of a set share an intrinsic property such as all runtime objects belonging to an application, a logon session, or by some user-defined rule.
  • the operating system may define standard set types for each of the intrinsic properties available for a set, and allow the user and applications to define custom set types.
  • a runtime object may belong to multiple sets, and the list of the runtime object's set membership may be obtained.
  • a set may also encompass other sets.
  • an application suite of products may define a set per product and create a set, representing the application suite, which contains each of the products' sets.
  • a utility program process, used by the application suite to launch each product may be a direct member of the application suite's set but not necessarily a direct member of the individual product sets.
  • the set allows collective actions on all its members such as suspend, terminate, control/audit resource consumption, virtualize resources, query membership, add/remove member, query/set intrinsic property, query/set set type, etc.
  • the operating system and other components may define other actions to take on a set.
  • Sets allow inheritance attributes, where any runtime object created by a parent automatically joins the parent object's sets with inheritance enabled. Another inheritance attribute allows the set memberships to propagate across communication networks for client-server models for the duration of the work item.
  • a client program process contacts a server process to perform a work item. Then, the server threads that receive and process the request temporarily join the inheritance sets of the client context until the work is completed.
  • Each member in a set has a designation of how the member joined the set.
  • the designation includes, for example, child creation inheritance, work item inheritance, or explicit membership.
  • Child creation inheritance represents members that join the set due to the inheritance attribute when a parent object creates a child object.
  • Work item inheritance means the runtime object is performing work on behalf of another runtime object.
  • Explicit membership denotes that a user or program manually added the runtime object to the set.
  • Specialized set types may specify custom designations for their particular needs.
  • the operating system may also control the security of the set via ACLs so that only the appropriate entities may perform accesses on a set.
  • the system creates an application set type and sets the intrinsic property as the application identity value.
  • the operating system retrieves the application identity for the application image and opens or creates the application set that has the application identity as the intrinsic property.
  • the operating system adds the newly-created runtime object, such as the process object, to the application set.
  • the application set may have a special designation in this case to denote that the member joined the set via application launch.
  • the new runtime object inherits its parent's sets as appropriate.
  • Components that want to determine which runtime objects belong to an application open the application set with the target application identity and query its members.
  • the caller may choose to distinguish the members between their designation: inheritance or explicit.
  • components may determine which applications a runtime object is running as.
  • the caller queries the runtime object's set membership and filters for the application set type. Components may further distinguish the set membership via the join designation.
  • Identifying the files belonging to an application serves an important role since applications typically launch their specific computer-executable instructions from files such as executables, dynamic-link libraries (dlls), and resources.
  • the operating system may track the file creations performed by an application and associate those files with the application.
  • One means of discovering the application's files involves monitoring application file creations with a file system filter driver. For example, when an application installation process starts, the operating system determines the appropriate application identity of the application and adds the process to the associated application set. As any runtime object member of the application set creates a file, the operating system associates the file with the application so that subsequent runtime objects launching from the file also join the application set.
  • the invention distinguishes between user files created by the application and application files created by the application.
  • a word processing application installs application files which it needs for execution. Yet, the same word processing application creates document files on behalf of the user.
  • the operating system may provide services, such as backup, where the user document files should get backed up, but not the application's files. Conversely, the user might want their user document files skipped by some operating system services like application uninstall or application resource virtualization.
  • the application knows best which file creations get performed on behalf of the user.
  • the application may denote to the system that a particular file creation is for a user file. Every other file creation gets treated as an application file.
  • the operating system may attempt to distinguish between user files and application files by monitoring application installation and/or updating runtime objects, which the operation system treats as application files. Other file creations performed by application get treated as user files. Possible other identifying metadata include, but are not limited to, file extensions, existence of a code module header, and file system path.
  • need to determine whether a particular runtime object belongs to the operating system and which resources were created by the operating system. For example, the operating system has specific resources that should be restricted for access by operating system components. Applications should not be able to access those resources.
  • the operating system may explicitly declare its resource ownership in a manifest, pre-populate the association database with identification information for the resources belonging to the operating system, directly sign its resources, store its resources in protected locations, or monitor the resource creation performed by the operating system installer. Other techniques for monitoring the operating system installer are contemplated.
  • the application identity of the operating system may grant more access than an application acquires, the operating system application identity is guarded.
  • the application identity used to denote the operating system is reserved and restricted for assignment by only privileged operating system components.
  • Operating systems may wish to further distinguish between components of the operating system. This granularity allows the operating system to protect individual components from other operating system components.
  • the system may attempt to protect objects based on application identity.
  • the system may utilize application identity in addition to user identity to protect objects.
  • an application may decide that it wants to restrict access to its temporary files to itself.
  • the application sets the security on the file to allow only the application sole access to the file.
  • the system denies the request.
  • a finance application may decide that access to the user's finance documents should be restricted to just that user and also to that application. In this manner, a virus program running in the user's context lacks access to the user's finance documents. If other finance applications need access to the user's finance documents, the original finance application may explicitly grant access to specific applications or to a group of finance application identities.
  • the system allows the user and application publisher to define actions that the application may perform (e.g., access user personal documents or access the network).
  • the system components monitoring or performing the actions check whether the application has been granted access to that capability. If the application attempts to perform an action for which it lacks access, then the system responds appropriately. The system may reject the attempted action or notify the user of the attempt and confirm whether the application should be granted access to that capability.
  • the user defines which application publishers should be trusted to specify application capabilities. Therefore, a malicious program will likely not have a trust application publisher, thus the user rejects certain application's action requests due to the untrusted or unknown application publisher.
  • the system of the invention attempts to expand existing security systems beyond user level granularity (e.g., per ACLs) into a more user-understandable system of application actions which the system of the invention enforces.
  • FIG. 8 an exemplary block diagram illustrates an architecture for application identity services in the context of a mechanism to protect system resources.
  • the architecture in FIG. 8 is merely one example of the application of identity information.
  • Other architectures and other applications of the identity information are contemplated to be within the scope of the invention.
  • a client server runtime process determines and assigns identities to each module during CreateProcess( ). The determined and assigned identities are used to perform file and system setting mitigation to protect operating system resources.
  • a component store or other memory area stores auto-generated application identity for non-manifested applications as well as the isolation identity for all types of processes. Isolation generation rules and isolation policies allow consistent grouping of the application identifiers into larger groups based on a set of criteria.
  • a file tagging service stores the application identity and isolation identity within the file stream for every file created by the process.
  • System setting mitigation and file mitigation use the application identity and isolation identity to create separate virtual environments and mark the transacted changes.
  • FIG. 9 shows one example of a general purpose computing device in the form of a computer 130 .
  • a computer such as the computer 130 is suitable for use in the other figures illustrated and described herein.
  • Computer 130 has one or more processors or processing units 132 and a system memory 134 .
  • a system bus 136 couples various system components including the system memory 134 to the processors 132 .
  • the bus 136 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
  • ISA Industry Standard Architecture
  • MCA Micro Channel Architecture
  • EISA Enhanced ISA
  • VESA Video Electronics Standards Association
  • PCI Peripheral Component Interconnect
  • the computer 130 typically has at least some form of computer readable media.
  • Computer readable media which include both volatile and nonvolatile media, removable and non-removable media, may be any available medium that may be accessed by computer 130 .
  • Computer readable media comprise computer storage media and communication media.
  • Computer storage media include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by computer 130 .
  • Communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media. Those skilled in the art are familiar with the modulated data signal, which has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • Wired media such as a wired network or direct-wired connection
  • wireless media such as acoustic, RF, infrared, and other wireless media
  • communication media such as acoustic, RF, infrared, and other wireless media
  • the system memory 134 includes computer storage media in the form of removable and/or non-removable, volatile and/or nonvolatile memory.
  • system memory 134 includes read only memory (ROM) 138 and random access memory (RAM) 140 .
  • ROM read only memory
  • RAM random access memory
  • BIOS basic input/output system
  • RAM 140 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 132 .
  • FIG. 9 illustrates operating system 144 , application programs 146 , other program modules 148 , and program data 150 .
  • the computer 130 may also include other removable/non-removable, volatile/nonvolatile computer storage media.
  • FIG. 9 illustrates a hard disk drive 154 that reads from or writes to non-removable, nonvolatile magnetic media.
  • FIG. 9 also shows a magnetic disk drive 156 that reads from or writes to a removable, nonvolatile magnetic disk 158 , and an optical disk drive 160 that reads from or writes to a removable, nonvolatile optical disk 162 such as a CD-ROM or other optical media.
  • removable/non-removable, volatile/nonvolatile computer storage media that may be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
  • the hard disk drive 154 , and magnetic disk drive 156 and optical disk drive 160 are typically connected to the system bus 136 by a non-volatile memory interface, such as interface 166 .
  • the drives or other mass storage devices and their associated computer storage media discussed above and illustrated in FIG. 9 provide storage of computer readable instructions, data structures, program modules and other data for the computer 130 .
  • hard disk drive 154 is illustrated as storing operating system 170 , application programs 172 , other program modules 174 , and program data 176 .
  • operating system 170 application programs 172 , other program modules 174 , and program data 176 are given different numbers here to illustrate that, at a minimum, they are different copies.
  • a user may enter commands and information into computer 130 through input devices or user interface selection devices such as a keyboard 180 and a pointing device 182 (e.g., a mouse, trackball, pen, or touch pad).
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • processing unit 132 through a user input interface 184 that is coupled to system bus 136 , but may be connected by other interface and bus structures, such as a parallel port, game port, or a Universal Serial Bus (USB).
  • a monitor 188 or other type of display device is also connected to system bus 136 via an interface, such as a video interface 190 .
  • computers often include other peripheral output devices (not shown) such as a printer and speakers, which may be connected through an output peripheral interface (not shown).
  • the computer 130 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 194 .
  • the remote computer 194 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer 130 .
  • the logical connections depicted in FIG. 9 include a local area network (LAN) 196 and a wide area network (WAN) 198 , but may also include other networks.
  • LAN 136 and/or WAN 138 may be a wired network, a wireless network, a combination thereof, and so on.
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and global computer networks (e.g., the Internet).
  • computer 130 When used in a local area networking environment, computer 130 is connected to the LAN 196 through a network interface or adapter 186 . When used in a wide area networking environment, computer 130 typically includes a modem 178 or other means for establishing communications over the WAN 198 , such as the Internet.
  • the modem 178 which may be internal or external, is connected to system bus 136 via the user input interface 184 , or other appropriate mechanism.
  • program modules depicted relative to computer 130 may be stored in a remote memory storage device (not shown).
  • FIG. 9 illustrates remote application programs 192 as residing on the memory device.
  • the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • the data processors of computer 130 are programmed by means of instructions stored at different times in the various computer-readable storage media of the computer.
  • Programs and operating systems are typically distributed, for example, on floppy disks or CD-ROMs. From there, they are installed or loaded into the secondary memory of a computer. At execution, they are loaded at least partially into the computer's primary electronic memory.
  • the invention described herein includes these and other various types of computer-readable storage media when such media contain instructions or programs for implementing the steps described below in conjunction with a microprocessor or other data processor.
  • the invention also includes the computer itself when programmed according to the methods and techniques described herein.
  • the invention is operational with numerous other general purpose or special purpose computing system environments or configurations.
  • the computing system environment is not intended to suggest any limitation as to the scope of use or functionality of the invention.
  • the computing system environment should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment.
  • Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, mobile telephones, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • the invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices.
  • program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including memory storage devices.
  • An interface in the context of a software architecture includes a software module, component, code portion, or other sequence of computer-executable instructions.
  • the interface includes, for example, a first module accessing a second module to perform computing tasks on behalf of the first module.
  • the first and second modules include, in one example, application programming interfaces (APIs) such as provided by operating systems, component object model (COM) interfaces (e.g., for peer-to-peer application communication), and extensible markup language metadata interchange format (XMI) interfaces (e.g., for communication between web services).
  • APIs application programming interfaces
  • COM component object model
  • XMI extensible markup language metadata interchange format
  • the interface may be a tightly coupled, synchronous implementation such as in Java 2 Platform Enterprise Edition (J2EE), COM, or distributed COM (DCOM) examples.
  • the interface may be a loosely coupled, asynchronous implementation such as in a web service (e.g., using the simple object access protocol).
  • the interface includes any combination of the following characteristics: tightly coupled, loosely coupled, synchronous, and asynchronous.
  • the interface may conform to a standard protocol, a proprietary protocol, or any combination of standard and proprietary protocols.
  • the interfaces described herein may all be part of a single interface or may be implemented as separate interfaces or any combination therein.
  • the interfaces may execute locally or remotely to provide functionality. Further, the interfaces may include additional or less functionality than illustrated or described herein.
  • computer 130 executes computer-executable instructions such as those illustrated in the figures to determine and assign application and isolation identities to enable the management of a plurality of applications on a computing system.

Abstract

Managing the installation, execution, and removal of application programs by an operating system via an application identity associated with each application program. A method of the invention assigns the application identity to each application program and a resource identity to each resource associated with each application program. The method relates the assigned application identity and resource identity to enable manipulation of the application program and its resources.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Application No. 60/513,941, filed Oct. 24, 2003. Filed simultaneously herewith is U.S. non-provisional patent application entitled “Operating System Resource Protection,” attorney docket number MS#306894.01 (5103) (which also claims the benefit of U.S. Provisional Application No. 60/513,941, filed Oct. 24, 2003), the entire disclosure of which is incorporated herein by reference.
  • TECHNICAL FIELD
  • Embodiments of the present invention relate to the field of operating systems for computing devices. In particular, embodiments of this invention relate to managing the installation, execution, and removal of application programs by the operating system via application identities.
  • BACKGROUND OF THE INVENTION
  • While current operating systems have made dramatic strides in improving their usability and reliability, further improvements are desired. In particular, the user experience relating to the installation, management, and removal (i.e., uninstallation) of application programs still needs improvement. For example, during installation an application program may incorrectly configure a system setting or overwrite a file needed by another application program. It may also be difficult for a user to uninstall undesirable application programs such as ad-ware and spy-ware. Many system crashes and hangs may also be attributable to application problems. For example, the following situations may cause an application program and possibly the underlying operating system to fail: an incomplete uninstall of an application, over deletion when uninstalling an application program, and improperly stored files.
  • In some current operating systems, a newly-installed application program may overwrite a shared dynamic-link library (DLL) file with an older or newer version needed by the newly-installed application program. If the older or newer file is incompatible with the overwritten file, a currently-installed application program dependent on the overwritten file may crash when attempting to access the overwritten file.
  • Current operating systems lack a mechanism for identifying and associating all the files and system settings associated with the installation of an application program. The operating systems want to recognize the application as there is a need to identify which application the system is acting on behalf of. However, applications may spread themselves across multiple runtime processes, helper utility programs, or system processes doing work for the application. Therefore, the operating systems have difficulties accurately identifying which application a runtime object is working as.
  • Furthermore, operating systems need a means to identify which resources, such as files and system settings, have been created by the operating system itself. As such, the operating system OS wants to identify which runtime objects are executing as the operating system as opposed to executing as a non-OS application. Without identifying the OS runtime objects, the system has a hard time restricting only OS runtime object accesses to system objects such as files.
  • Accordingly, an improved system and method for managing application impact is desired to address one or more of these and other disadvantages.
  • SUMMARY OF THE INVENTION
  • Embodiments of the invention include uniquely identifying an application program or other software product and its associated system objects (e.g., files) to allow an operating system to identify and differentiate between different application programs. In an embodiment, the invention includes an improved operating system that dynamically determines and assigns an identity to an application program. The operating system persists the assigned identity for use by the operating system whenever the application program is executed. Embodiments of the invention include methods for determining or assigning application identities such as: (1) direct assignment by a developer or application developer using an application manifest, (2) indirect identity assignment (e.g., through an installation program), (3) assignment based on an assessment of the files comprising the application program (e.g., a “footprint”), and (4) assignment based on an impersonation of one application program by another application program.
  • Various embodiments of the invention ensure the clean uninstallation of an application program from the system, prevent an application program from accessing unauthorized services or performing unauthorized actions, virtualize system resources to better isolate application programs from each other, enable rollback of application impact to the system (e.g., “undo” file type associations), and implement application-based impact tracking of files and system settings.
  • Embodiments of the inventions present a general runtime object management strategy which allows the system and user to configure custom solutions to act on a collection of runtime objects and to associate runtime objects based on common properties. One such property includes the collection of runtime objects that represent an application.
  • Some embodiments of the invention enable the operating system to identify itself, and to associate the operating system identity with its own files, system settings, and other objects. Further, some embodiments of the invention enable the operating system to recognize which runtime objects are executing as the operating system. Other embodiments of the invention create a security system based on application identity instead of or in addition to user identity.
  • In accordance with one aspect of the invention, a method manages a plurality of applications on a computing system. The method includes assigning an application identity to an application program. The assigned application identity differentiates the application program from other application programs. The method also includes assigning a resource identity to a resource associated with the application program. The method also includes relating the assigned application identity and the assigned resource identity.
  • In accordance with another aspect of the invention, a method enables an operating system to protect a resource associated therewith from modification by an application program. The method includes assigning an identity to an application program. The method also includes receiving a request from the application program for an operating system resource. Responsive to the received request, the method also determines whether a particular version of the operating system resource exists for the application program based on the identity and provides the application program with the particular version if the particular version exists for the application program. Otherwise, the method generates the particular version and provides the generated, particular version to the application program responsive to the determining.
  • In accordance with yet another aspect of the invention, one or more computer-readable media have computer-executable components for managing a plurality of applications on a computing system. The components include a creator component to assign an application identity to an application program. The assigned application identity differentiates the application program from other application programs. The components also include a revision component to assign a resource identity to a resource associated with the application program and an assignment component to relate the assigned application identity and the assigned resource identity.
  • In accordance with still another aspect of the invention, a system manages a plurality of application programs via an application identity associated with each of the plurality of application programs. The system includes an operating system that has an operating system resource associated therewith. The system also includes a memory area to store an application program and an application identity associated therewith. The system also includes a processor programmed to communicate with the operating system and the memory area to receive a request from the application program for the operating system resource and provide, responsive to the received request, a particular version of the operating system resource to the application program based on the application identity.
  • In accordance with another aspect of the invention, a computer-readable medium stores a data structure representing an identity context associated with a software product. The data structure includes an application identity field storing a value identifying the software product. The data structure also includes an isolation identity field storing a value associated with a group of software products to which the software product belongs.
  • Alternatively, the invention may comprise various other methods and apparatuses.
  • Other features will be in part apparent and in part pointed out hereinafter.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is an exemplary flow chart illustrating application identity generation by obtaining metadata about an application from different sources.
  • FIG. 2 is an exemplary block diagram illustrating isolation identities.
  • FIG. 3 is an exemplary flow chart illustrating the generation of an application identity and an isolation identity.
  • FIG. 4 is an exemplary block diagram illustrating the generation of an identity context for a file or other resource associated with an application program from components of the application's metadata.
  • FIG. 5 is an exemplary block diagram illustrating the propagation of an identity context during creation of a new file.
  • FIG. 6 is an exemplary block diagram illustrating identity information revision during process creation.
  • FIG. 7 is an exemplary flow chart illustrating the revision of identity information.
  • FIG. 8 is an exemplary block diagram illustrating an architecture for application identity services.
  • FIG. 9 is a block diagram illustrating one example of a suitable computing system environment in which the invention may be implemented.
  • Corresponding reference characters indicate corresponding parts throughout the drawings.
  • DETAILED DESCRIPTION OF THE INVENTION
  • In an embodiment, the invention includes assigning a unique identity to each application program or other software product installed or to be installed on a computing device. In particular, the invention includes assigning an application identity to the application program and a resource identity to each resource created or associated with the application program. A resource includes, but is not limited to, a file, folder, process, thread, system setting, named object, an application programming interface (API), a specific code path, a library of executable routines, operating system property value, and an operating system resource. For example, a number of APIs and code paths provide send mail capability, and access to these APIs and code paths might be restricted. In another example, the ability to reboot the system is restricted. Resources also include the system's name space (e.g., the ‘names’ themselves), not just specific named objects. For example, reserving or ‘squatting’ on a name before an object is created with the name creates both fragility and security issues.
  • The assigned application identity differentiates the application program from other application programs. An embodiment of the invention relates the application identity and the resource identity to enable safe manipulation, extensibility, and integration of the application program and its resources with the operating system. The application identity and resource identity provide uniqueness, consistency, and persistency (i.e., a non-evolving identity). Generally, an application identity and resource identity may be explicitly defined by an application manifest or other metadata or may be derived from attributes of the application. In one embodiment, the application identity and the resource identity are the same.
  • Similarly, the invention identifies resources that belong to the operating system. The operating system identity may be explicitly reserved or defined in the operating system manifest or from metadata, or derived during OS installation or execution.
  • Various benefits are achieved by identifying an application program and its resources. For example, identifying each application program enables users to undo any changes made to a computing device because the changes made by each application program (e.g., interactions with the computing device and resources) are persisted and logged. Further, identifying each application program and its associated resources enables the user to fully remove (e.g., uninstall) the application program and undo any changes made by the application program to the computing device resources.
  • In another example, identifying each application program installed or to be installed on a computing device enables the operating system to protect vital resources from accidental or malicious modification by an application installer. The application identities and operating system identity improve the consistency and reliability of the underlying operating system. The invention may also be combined with other protection strategies such as read-only access, isolation, virtualization, change tracking, and sandboxing to provide further protection.
  • The description, figures, and examples herein are not limited to any specific operating system. Rather, embodiments of the invention may be applied to an operating system of any type, model, and configuration. Further, embodiments of the invention are not limited to any of the exemplary methods described herein for assigning identities. Rather, embodiments of the invention are applicable to any method or design for uniquely identifying an application program and its associated resources, as well as identifying the operating system and its associated resources.
  • Determining and Storing an Application Identity
  • Referring first to FIG. 1, an exemplary flow chart illustrates a method for generating an application identity for an application program to be installed on a computing device. The method illustrated in FIG. 1 may be performed by an operating system component (e.g., a creator component) or a component not associated with an operating system. For example, an identity driver may be used to provide the identification service illustrated in FIG. 1. The driver may be configured to scan binary files as part of the installation process to generate application identities and also identify which binary files belong to each other.
  • The flow chart in FIG. 1 illustrates the extraction of metadata from various sources including, but not limited to, a pre-assigned application identity at 102, a manifest associated with the application program at 104, and an installation program used to install the application program at 106. The method extracts the metadata at 108 to determine the application identity. While FIG. 1 illustrates analysis of the sources in a particular order, other orderings are within the scope of the invention.
  • For the pre-assigned application identity embodiment, the operation system is configured to scan the deployment package of an application program. A unique signature is then produced from the scan (e.g., by using a hash). The unique signature is used to establish a link with a pre-assigned application identity. In one embodiment, the hash includes a sufficiently strong hash to render it probabilistically unlikely that the hash of any two files creates the same signature.
  • In some embodiments, the application identity is created by the application developer and is stored in an application manifest. The manifest accompanies the application program when the program is installed. The method determines an application identity from the manifest (e.g., included in a software distribution package) by locating and extracting information specific to the application program. The invention extracts and stores the metadata to determine the application identity for the application program to be installed. In one example, application identity is generated from a strong name by hashing the name and the PKH fields. In this embodiment, the manifest is a declarative source of the application identity.
  • If no metadata from these sources exists, embodiments of the invention identify the application program by generating a non-declarative application identity. The method generates the application identity information at 110 (including an application identity tag at 112) when the installation process begins if the application program does not have an assigned application identity (e.g., an application without a manifest or other predefined mechanism). This may be accomplished by locating and extracting specific information about the application program from the installation package (e.g., vendor, product name, product version, and module checksum). For example, an application suite with a number of different applications may be installed from a single installation program. The installation program may be configured with a single application identity that is applied to all programs installed from the single installation program. In a specific example, a business productivity suite may include an electronic mail program and word processing program, but the installation program may be configured to apply the same application identity to each application being installed because both programs are from the same application suite. In another embodiment, the installation program generates comparable identity information from the software product footprint. For example, different versions of the same application will have a different footprint, resulting in different application identities. In yet another example, a setup file (e.g., setup.ini) may be part of the software product deployment package. The setup.ini file includes information for an installation bootstrapper component (e.g., setup.exe) to perform. A property such as AppName in a specific section (e.g., Startup) of the setup.ini file may include the name of the product. In another example, file version information resources may include entries such as CompanyName and ProductName. The values for these entries are used as product vendor and product name attribute values. The information is extracted with functions such as GetFileVersionlnfo( ) and VerQueryValue( ). In an example in which the application identity data structure stores sixteen bytes, the first half of the structure stores hash values generated from the identified vendor name and product name.
  • The determined and generated identity information is stored (e.g., persisted) at 114 for future use (e.g., by the underlying operating system).
  • Determining the Components of an Application Program
  • Application programs include computer programs or pieces of software designed to perform one or more specific tasks or functions. An application program as perceived by a user may actually be a collection of components including, but not limited to, executable modules, dynamic libraries, resources, and supplementary files logically or functionally grouped to perform the set of specific tasks. The components may be bound together explicitly and implicitly to form the application program. Some of the components of an application program may have a hard dependency on each other. Some application components may be shared with other applications. The application program may have routines imported from other modules during a process referred to as “binding.” For example, in a portable executable file format, an import section defines the routines, modules, variables, and other symbols the loader should locate and link to create the application program. In another example, references to all the external assemblies used by the application program are listed in a manifest included within an assembly dynamic-link library (DLL) or supplied externally to service multiple DLLs.
  • Implicit dependencies are typically not regulated by any data structure within file formats. One module may depend on a symbol exported from another module, but the binding happens in runtime when a host module dynamically loads the other module. For example, a host module requests creation of an object instance and requests a reference to the module which provides the implementation for the object. In another example, a component may rely on data stored within a non-executable file such as a bitmap, an icon, video, and sound.
  • Embodiments of the invention include methods for identifying the explicit and implicit module dependencies to enable identification of an application program in various ways. Typically, the components that form an application program are grouped together by the application vendor into one deployment package. The methods include using the deployment package to track the files created and system settings stored during installation to identify the files belonging to a specific application program. The methods assign an identity to each of the files created by the application. The identity is associated with the application identity of the application program as illustrated in FIG. 4.
  • Isolation Identities
  • In some embodiments, an isolation identity is assigned to an application program in addition to an application identity by an operating system component (e.g., a group component) according to the invention. While the isolation identity may be associated with just this application, the isolation identity may also be associated with another application program having another application identity associated therewith. The isolation identity may be used to logically group application programs with different application identities. In general, the application programs may have a common context (e.g., installed by a particular user). For example, if two application programs from the same application suite have different application identities, the operating system assigns the same isolation identity to both application programs. Some or all of the information gathered to generate the application identities may be used to group the applications into isolation identities based on analogous characteristics. For example, embodiments of the invention may use the vendor name, product name, and/or a signature of the binary content of the module to generate the isolation identity.
  • In general, an isolation identity is generated by obtaining module metadata or other attributes. Based on the type of the module and functional designation there are various ways for the module vendor (e.g., developer) to associate metadata with the module. The metadata may be part of the physical file representing the module or stored in a separate file or files.
  • The application programs assigned to a specific isolation identity create a virtual program group. All applications programs in the virtual program group receive the equivalent virtualized view of the operating system (e.g., the same level of access to system resources). That is, different applications with the same isolation identity share the same virtualized view of the system. In an example in which different versions of the same application program are assigned different application identities, the different versions may be assigned the same isolation identity because the different versions are to receive equivalent access to system resources.
  • An operating system provides access control for its resources via the application identities and/or the isolation identities. For example, the operating system may maintain multiple copies and/or versions of the same file (e.g., virtual copies) with potentially different access rights with respect to an application. The operating system dynamically virtualizes a file requested by an application program with a specific isolation identity for write access. In one embodiment, all products from different vendors and different products from the same vendor have different virtualized views while all versions of the same product from the same vendor share the same virtualized view. The comparison of the vendor names and product names may be based on the case insensitive string values for the vendor name and product name attributes.
  • Referring next to FIG. 2, an exemplary block diagram illustrates the use of isolation identities. In FIG. 2, an application program with application identity ID1 and an application with application identity ID2 have the same isolation identity IsoID1. An application program with application identity ID3 has isolation identity IsoID2. An operating system 202 maintains two copies of File A: one copy 204 of File A for write access by applications with IsoID1 (e.g., application programs ID1 and ID2), and one copy 206 of File A for write access by applications with IsoID2 (e.g., application program ID3).
  • In operation, a component of an operating system 202 according to an embodiment of the invention (e.g., a virtualization component) receives a request from application program ID1 for File A. In one embodiment, the request includes the assigned identity ID1 and IsoID1. In other embodiments, the operating system 202 infers the assigned identity ID1 and IsoID1 or queries the application program ID1 for the assigned identity ID1 and IsoID1. Responsive to the received request, the operating system 202 determines whether a particular version of the operating system resource exists for the application program based on the received identity. In this case, the copy 204 of File A exists for the identity IsoID1. The operating system 202 provides the application program ID1 with the copy 204 of File A exists for IsoID1. If the copy 204 of File A for IsoID1 did not exist, the operating system 202 would generate the copy from original File A and provide the generated copy to application program ID1.
  • Generating the Application Identity and Isolation Identity During Runtime
  • Referring next to FIG. 3, a flow chart illustrates an exemplary method for determining an application identity and an isolation identity of a module during runtime. In one embodiment, an operating system or client server runtime process executes the functions illustrated in FIG. 3. A parent process spawns a child process by, for example, invoking a function such as CreateProcess( ). If the application identity and the isolation identity for the module associated with the child process exist, the method loads the identities from the identity store and assigns the identities to the process along with other runtime data. If the identities do not exist, the method performs various operations to determine and assign the identities. For example, the method consults a manifest and loads the identities from the manifest if the manifest contains the identities. The method may also consult application compatibility data and installation program data to obtain information about the module. The method may further extract version information from the module or compute a checksum to determine the application identity and isolation identity. The method stores the determined identities for future use (e.g., as a globally unique sixteen byte data structure).
  • The application identity and the isolation identity may be combined to form an identity context associated with an application program or a module therein.
  • Application Identity Data Structures
  • The identity tag for a module or component persists the application's identity context. The identity context may also include one or more flags to store additional information such as attributes associated with the methods of generating the application identity and the isolation identity. For example, the flags may include an installer bit that indicates that the metadata used to generate the application identity and the isolation identity was extracted from a module identified as a known installer.
  • Referring next to FIG. 4, an exemplary block diagram illustrates the structure and generation of an identity tag for a file associated with an application program. Embodiments of the invention include methods for using an identity context associated with an application program to create an identity tag for each file or other resource created or modified by the application program. The identity context is persisted within a store using kernel tagging services. For example, the identity context may be persisted within a file stream or a file attribute.
  • In one embodiment, the identity tag for a file or other component includes a creator context formed during creation of the file (e.g., CreateFile( )) and a revised context formed during process creation (e.g., CreateProcess( )). The file tag may only have a creator context until process creation for the file during which the identity is elaborated or revised.
  • Referring next to FIG. 5, an exemplary block diagram illustrates the propagation of an identity context during file creation. In the example of FIG. 5, Process 1 creates File A. The revised ID context from the identity of Process 1 forms the creator ID context portion of the identity tag File A, while the revised ID context for File A remains empty.
  • Revising the Identity Context During Process Creation
  • Referring next to FIG. 6, a block diagram illustrates elaboration of the identity context for a module such as File A during process creation for the module to create the revised identity context. For example, when a user executes the module, embodiments of the invention determine if there is a creator identity context associated with the module. If there is a creator identity context, the identity context is elaborated to create a revised context and persist it in the tag. The revised identity context is associated with the run-time data about the module stored, for example, by the operating system.
  • If an identity tag does not exist for the module, embodiments of the invention determine an identity and form the creator context and the revised context. The created identity context is persisted in the file's tag for future execution of the module.
  • Revising the identity context includes using heuristic algorithms and checking signatures with a pre-populated library of application identities (e.g., inherited identity context). Further, elaboration methods include analyzing the revised context of the parent process, the creator context of the module (e.g., File A), and the module itself (e.g., File A) to generate the revised context of the module. In one example, the creator context for the module is copied into the revised context if the module does not have a declarative identity. In another example, the value for the revised context is derived from the module or metadata if the module has a declarative identity.
  • In an alternative embodiment, a generic system utility executes without an identity but derives an identity from the first non-system library that it loads.
  • Referring next to FIG. 7, an exemplary flow chart illustrates the revision of identity information during process creation. An embodiment of the invention includes components for revising (e.g., a revision component) the identity context and relating (e.g., an assignment component) the revised identity context to the application identity. In one embodiment, the method illustrated in FIG. 7 is performed by a single operating system component. The method includes obtaining the identity context for the module being executed at 702 and the parent process at 704. If the module has a revised identity context at 706, the revised identity context is returned for the process at 708. If the module does not have a revised identity context at 706 but a declarative identity (e.g., a manifest) exists for the module at 710, the method forms the revised context of the module's identity context from the declarative identity at 712. If the declarative identity does not exist at 710, but the module is a known installer at 714, the method forms the revised context from the module metadata at 726. If the module is not a known installer at 714, but is a known shared installer engine at 716, the method determines if the identity context should be derived from the startup environment at 718. If the identity context should be derived from the startup environment at 718, the method forms the revised context from the process startup environment (e.g., the files referenced in the command line) at 720. If the identity context does not need to be derived from the startup environment at 718, the method determines whether the parent process identity context is the same as the system identity context at 722. If the parent process identity context is different from the system identity context at 722, the method copies the parent process context into the module identity context at 724. If the parent process identity context is the same as the system identity context at 722, the method forms the revised context from the module metadata at 726.
  • If the module is not a known shared installer engine at 716, but the module's identity context has a “created by installer” flag at 728, the method forms the revised context from the creator context at 730. If the module's creator identity context does not have a “created by installer” flag at 728, the method forms the revised context from the module metadata at 726. The method returns the revised identity context for the new process at 732.
  • In one embodiment, the assigned identity context for a module may be tagged for re-assignment. A subsequent attempt to create a process on the module prompts an embodiment of the invention to generate and assign a new identity. In another embodiment, information is persisted to enable reverse-engineering and disaster recovery of the file/process creation hierarchy. Such information may include a system-wide cache of each module and its identity tag. In yet another embodiment, a manifest is automatically generated and updated with identity context data for each module.
  • Identity Context Impersonation
  • In some cases it may be useful to allow an application to temporarily impersonate another application. For example, it may be desirable to have a server-based installation program temporarily impersonate the application identity of a client resident installation program so that the installed application will appear to have been installed from the client. The use of impersonated application identities allows a thread or process to execute with the identity context of another application. Embodiments of the invention may be configured to provide a runtime service (e.g., an impersonation component) to transition an application identity from one application to another. The runtime service enables an application to acquire the identity of another application for performing work on behalf of an application after the completion of which the original identity is restored. Access control may be implemented to enable only selected application programs to impersonate other application programs. For example, the requestor's rights are checked against a security descriptor of the target process or token.
  • Embodiments of the invention also provide implicit impersonation. For implicit impersonation, the system overrides the identity contexts obtained from the identity tag and assigns different contexts based on other information about the process module. For example, a parent process instantiates an object within a context of the local server. The server thread is assigned the same identity context as the parent process that initiated the object instantiation. An example of explicit impersonation includes assigning the identity of a parent “bootstrapper” process to another process if the other process is a known shared installer engine.
  • Application Security Identity
  • Embodiments of the invention grant security rights to an application by associating the rights with the application's identity and the identity of the user that is running the application. Application-specific security rights can be associated with a running application by adding an application-specific Security ID (APP-SID) to the security token associated with processes and services that execute on behalf of the application. Access control lists (ACLs) associated with operating system objects (including but not limited to files, ports, memory, processes, threads, and system services) include access rights with respect to APP-SIDs as well as security identifiers for users.
  • With the invention, the access checks in a security monitor of the invention consider multiple SIDs when deciding to grant access. In previous systems there was only the single SID belonging to the user. APP-SIDs introduce at least one new SID to compute against the access rights granted by the ACL. And in some embodiments, an access request may have more than one APP-SID associated with the request.
  • The embodiment of APP-SIDs in a typical security monitor interpret multiple SIDS in one of several ways as specified by the ACL itself: grant access according to the intersection of privileges of all the SIDs presented (e.g., the least common) or grant access according to the union of the access rights of the SIDs.
  • Computing the intersection of the SIDs may occur when a user has access to an object, but does not want to grant that access to an application. Alternatively, computing the intersection of the SIDs may occur when an application has access to an object but doesn't want to grant access unless the user (or all other applications) also has access. One use of intersection restricts the access of an application downloaded from the network so that it only has access to certain files that are accessible by the user.
  • Granting access according to the union interpretation allows an application to acquire additional access that the user may not possess. In one such use, a user may not have access to a system service to change the date in the system clock. But the user may have access to a service which has an APP-SID that does allow the date to be changed. The advantage is that the accessible service provides more limited functionality than the underlying service for changing the date, such as only allowing date changes that fall within a limited range. APP-SIDs allow such intermediate service to be written.
  • Some embodiments use other combinations of access checks, such as respecting the DENY Access Control Entry (ACE) in an Access Control List to deny access even if GRANT access is computed by union. Other embodiments may treat application and user SIDS differently, using the GRANT/DENY ACEs associated with an APP-SID to grant or deny additional privileges to a user's SID with respect to an object.
  • In another embodiment, the application identity may also be used to associate generalized privileges (e.g., capabilities) with an application. Capabilities differ from ACL-based security in that a capability is not checked against an access list associated with an object but is instead explicitly checked for by code in key system paths. For example, a capability (e.g., send mail) may be associated with an application. There is no specific object associated with sending mail, but there are a number of code paths that may be used to send mail. Each code path checks for the privilege of the application to send mail before permitting the application to execute the code path.
  • Servicing Applications based on their Application Identity
  • Application identities and isolation identities provide a framework to manage the manner in which an operating system provides services to applications that are installed on the system. The services may be provided based on application identities or isolation identities. An embodiment of the invention uses a storage system for the application identities and/or the isolation identities along with an application programming interface (API) that provides access to the identity information during runtime. Depending on the implementation, the service provider may be able to acquire the identity of the application to be serviced regardless of the runtime state (i.e., whether the application is running or not) to perform the actions over the application process or the files or resource set belonging to the applications.
  • Next, some potential benefits of the features described herein are discussed. While these are potential benefits, actual implementation and selection of particular features will dictate which of these advantages, if any, are associated with a particular implementation. Software application identities allow the system to recognize an application as one entity and provide services to it. Determining and assigning non-declarative identities enables the operation system to automatically recognize every application installed and to be installed on the system. The precise and reliable identification of the software deployment package is an important for early detection and population of the identities of the application programs associated with the package. The concept of providing services to the application expands and generalizes the software administration process from the servicing of different applications each with individual activities to the common set of actions from the operating system toward the software loaded. Within a scope of the application identity framework, each application has its own identification information. There is a class of tasks to be performed by one application on behalf of another. The most typical example is administration and maintenance. Embodiments of the invention allow the administrative tools and utilities to impersonate the servicing application.
  • General Runtime Object Management
  • A set denotes a container object which contains runtime entity members, such as processes, threads, and other sets. The members of a set share an intrinsic property such as all runtime objects belonging to an application, a logon session, or by some user-defined rule. The operating system may define standard set types for each of the intrinsic properties available for a set, and allow the user and applications to define custom set types. A runtime object may belong to multiple sets, and the list of the runtime object's set membership may be obtained.
  • A set may also encompass other sets. For example, an application suite of products may define a set per product and create a set, representing the application suite, which contains each of the products' sets. A utility program process, used by the application suite to launch each product, may be a direct member of the application suite's set but not necessarily a direct member of the individual product sets.
  • The set allows collective actions on all its members such as suspend, terminate, control/audit resource consumption, virtualize resources, query membership, add/remove member, query/set intrinsic property, query/set set type, etc. The operating system and other components may define other actions to take on a set.
  • Sets allow inheritance attributes, where any runtime object created by a parent automatically joins the parent object's sets with inheritance enabled. Another inheritance attribute allows the set memberships to propagate across communication networks for client-server models for the duration of the work item. To illustrate, a client program process contacts a server process to perform a work item. Then, the server threads that receive and process the request temporarily join the inheritance sets of the client context until the work is completed.
  • Each member in a set has a designation of how the member joined the set. The designation includes, for example, child creation inheritance, work item inheritance, or explicit membership. Child creation inheritance represents members that join the set due to the inheritance attribute when a parent object creates a child object. Work item inheritance means the runtime object is performing work on behalf of another runtime object. Explicit membership denotes that a user or program manually added the runtime object to the set. Specialized set types may specify custom designations for their particular needs.
  • The operating system may also control the security of the set via ACLs so that only the appropriate entities may perform accesses on a set.
  • Application Runtime Identification Using Sets
  • Sets provide a convenient way to identify all the runtime objects belonging to the application as well as the runtime objects performing work on behalf of the application. The system creates an application set type and sets the intrinsic property as the application identity value.
  • As an application is launched, the operating system retrieves the application identity for the application image and opens or creates the application set that has the application identity as the intrinsic property. The operating system adds the newly-created runtime object, such as the process object, to the application set. The application set may have a special designation in this case to denote that the member joined the set via application launch. The new runtime object inherits its parent's sets as appropriate.
  • Components that want to determine which runtime objects belong to an application open the application set with the target application identity and query its members. The caller may choose to distinguish the members between their designation: inheritance or explicit. Inversely, components may determine which applications a runtime object is running as. The caller queries the runtime object's set membership and filters for the application set type. Components may further distinguish the set membership via the join designation.
  • Identifying the Files of an Application for Application Identity
  • Identifying the files belonging to an application serves an important role since applications typically launch their specific computer-executable instructions from files such as executables, dynamic-link libraries (dlls), and resources. In order to identify the application's files when the application does not declare which files belong to it, the operating system may track the file creations performed by an application and associate those files with the application.
  • One means of discovering the application's files involves monitoring application file creations with a file system filter driver. For example, when an application installation process starts, the operating system determines the appropriate application identity of the application and adds the process to the associated application set. As any runtime object member of the application set creates a file, the operating system associates the file with the application so that subsequent runtime objects launching from the file also join the application set.
  • The invention distinguishes between user files created by the application and application files created by the application. To illustrate, a word processing application installs application files which it needs for execution. Yet, the same word processing application creates document files on behalf of the user. The operating system may provide services, such as backup, where the user document files should get backed up, but not the application's files. Conversely, the user might want their user document files skipped by some operating system services like application uninstall or application resource virtualization.
  • Ultimately, the application knows best which file creations get performed on behalf of the user. Thus, the application may denote to the system that a particular file creation is for a user file. Every other file creation gets treated as an application file.
  • Without application cooperation, the operating system may attempt to distinguish between user files and application files by monitoring application installation and/or updating runtime objects, which the operation system treats as application files. Other file creations performed by application get treated as user files. Possible other identifying metadata include, but are not limited to, file extensions, existence of a code module header, and file system path.
  • Identifying System Components and Associated Resources
  • Often components need to determine whether a particular runtime object belongs to the operating system and which resources were created by the operating system. For example, the operating system has specific resources that should be restricted for access by operating system components. Applications should not be able to access those resources.
  • To determine the resources belonging to the operating system, the operating system may explicitly declare its resource ownership in a manifest, pre-populate the association database with identification information for the resources belonging to the operating system, directly sign its resources, store its resources in protected locations, or monitor the resource creation performed by the operating system installer. Other techniques for monitoring the operating system installer are contemplated.
  • Since the application identity of the operating system may grant more access than an application acquires, the operating system application identity is guarded. In one embodiment, the application identity used to denote the operating system is reserved and restricted for assignment by only privileged operating system components.
  • Operating systems may wish to further distinguish between components of the operating system. This granularity allows the operating system to protect individual components from other operating system components.
  • Capabilities-Based Security
  • By having a runtime application identity and recognizing which files belong to the application, the system may attempt to protect objects based on application identity. The system may utilize application identity in addition to user identity to protect objects.
  • For example, an application may decide that it wants to restrict access to its temporary files to itself. Thus, the application sets the security on the file to allow only the application sole access to the file. When a different application tries to open the original application's temporary file, the system denies the request.
  • In another example, a finance application may decide that access to the user's finance documents should be restricted to just that user and also to that application. In this manner, a virus program running in the user's context lacks access to the user's finance documents. If other finance applications need access to the user's finance documents, the original finance application may explicitly grant access to specific applications or to a group of finance application identities.
  • In yet another example, the system allows the user and application publisher to define actions that the application may perform (e.g., access user personal documents or access the network). The system components monitoring or performing the actions check whether the application has been granted access to that capability. If the application attempts to perform an action for which it lacks access, then the system responds appropriately. The system may reject the attempted action or notify the user of the attempt and confirm whether the application should be granted access to that capability.
  • In one embodiment, the user defines which application publishers should be trusted to specify application capabilities. Therefore, a malicious program will likely not have a trust application publisher, thus the user rejects certain application's action requests due to the untrusted or unknown application publisher.
  • The system of the invention attempts to expand existing security systems beyond user level granularity (e.g., per ACLs) into a more user-understandable system of application actions which the system of the invention enforces.
  • Exemplary Architecture
  • Referring next to FIG. 8, an exemplary block diagram illustrates an architecture for application identity services in the context of a mechanism to protect system resources. The architecture in FIG. 8 is merely one example of the application of identity information. Other architectures and other applications of the identity information are contemplated to be within the scope of the invention.
  • In FIG. 8, a client server runtime process determines and assigns identities to each module during CreateProcess( ). The determined and assigned identities are used to perform file and system setting mitigation to protect operating system resources. A component store or other memory area stores auto-generated application identity for non-manifested applications as well as the isolation identity for all types of processes. Isolation generation rules and isolation policies allow consistent grouping of the application identifiers into larger groups based on a set of criteria. A file tagging service stores the application identity and isolation identity within the file stream for every file created by the process. System setting mitigation and file mitigation use the application identity and isolation identity to create separate virtual environments and mark the transacted changes.
  • Exemplary Operating Environment
  • FIG. 9 shows one example of a general purpose computing device in the form of a computer 130. In one embodiment of the invention, a computer such as the computer 130 is suitable for use in the other figures illustrated and described herein. Computer 130 has one or more processors or processing units 132 and a system memory 134. In the illustrated embodiment, a system bus 136 couples various system components including the system memory 134 to the processors 132. The bus 136 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
  • The computer 130 typically has at least some form of computer readable media. Computer readable media, which include both volatile and nonvolatile media, removable and non-removable media, may be any available medium that may be accessed by computer 130. By way of example and not limitation, computer readable media comprise computer storage media and communication media. Computer storage media include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. For example, computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by computer 130. Communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media. Those skilled in the art are familiar with the modulated data signal, which has one or more of its characteristics set or changed in such a manner as to encode information in the signal. Wired media, such as a wired network or direct-wired connection, and wireless media, such as acoustic, RF, infrared, and other wireless media, are examples of communication media. Combinations of the any of the above are also included within the scope of computer readable media.
  • The system memory 134 includes computer storage media in the form of removable and/or non-removable, volatile and/or nonvolatile memory. In the illustrated embodiment, system memory 134 includes read only memory (ROM) 138 and random access memory (RAM) 140. A basic input/output system 142 (BIOS), containing the basic routines that help to transfer information between elements within computer 130, such as during start-up, is typically stored in ROM 138. RAM 140 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 132. By way of example, and not limitation, FIG. 9 illustrates operating system 144, application programs 146, other program modules 148, and program data 150.
  • The computer 130 may also include other removable/non-removable, volatile/nonvolatile computer storage media. For example, FIG. 9 illustrates a hard disk drive 154 that reads from or writes to non-removable, nonvolatile magnetic media. FIG. 9 also shows a magnetic disk drive 156 that reads from or writes to a removable, nonvolatile magnetic disk 158, and an optical disk drive 160 that reads from or writes to a removable, nonvolatile optical disk 162 such as a CD-ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that may be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 154, and magnetic disk drive 156 and optical disk drive 160 are typically connected to the system bus 136 by a non-volatile memory interface, such as interface 166.
  • The drives or other mass storage devices and their associated computer storage media discussed above and illustrated in FIG. 9, provide storage of computer readable instructions, data structures, program modules and other data for the computer 130. In FIG. 9, for example, hard disk drive 154 is illustrated as storing operating system 170, application programs 172, other program modules 174, and program data 176. Note that these components may either be the same as or different from operating system 144, application programs 146, other program modules 148, and program data 150. Operating system 170, application programs 172, other program modules 174, and program data 176 are given different numbers here to illustrate that, at a minimum, they are different copies.
  • A user may enter commands and information into computer 130 through input devices or user interface selection devices such as a keyboard 180 and a pointing device 182 (e.g., a mouse, trackball, pen, or touch pad). Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are connected to processing unit 132 through a user input interface 184 that is coupled to system bus 136, but may be connected by other interface and bus structures, such as a parallel port, game port, or a Universal Serial Bus (USB). A monitor 188 or other type of display device is also connected to system bus 136 via an interface, such as a video interface 190. In addition to the monitor 188, computers often include other peripheral output devices (not shown) such as a printer and speakers, which may be connected through an output peripheral interface (not shown).
  • The computer 130 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 194. The remote computer 194 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer 130. The logical connections depicted in FIG. 9 include a local area network (LAN) 196 and a wide area network (WAN) 198, but may also include other networks. LAN 136 and/or WAN 138 may be a wired network, a wireless network, a combination thereof, and so on. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and global computer networks (e.g., the Internet).
  • When used in a local area networking environment, computer 130 is connected to the LAN 196 through a network interface or adapter 186. When used in a wide area networking environment, computer 130 typically includes a modem 178 or other means for establishing communications over the WAN 198, such as the Internet. The modem 178, which may be internal or external, is connected to system bus 136 via the user input interface 184, or other appropriate mechanism. In a networked environment, program modules depicted relative to computer 130, or portions thereof, may be stored in a remote memory storage device (not shown). By way of example, and not limitation, FIG. 9 illustrates remote application programs 192 as residing on the memory device. The network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • Generally, the data processors of computer 130 are programmed by means of instructions stored at different times in the various computer-readable storage media of the computer. Programs and operating systems are typically distributed, for example, on floppy disks or CD-ROMs. From there, they are installed or loaded into the secondary memory of a computer. At execution, they are loaded at least partially into the computer's primary electronic memory. The invention described herein includes these and other various types of computer-readable storage media when such media contain instructions or programs for implementing the steps described below in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
  • For purposes of illustration, programs and other executable program components, such as the operating system, are illustrated herein as discrete blocks. It is recognized, however, that such programs and components reside at various times in different storage components of the computer, and are executed by the data processor(s) of the computer.
  • Although described in connection with an exemplary computing system environment, including computer 130, the invention is operational with numerous other general purpose or special purpose computing system environments or configurations. The computing system environment is not intended to suggest any limitation as to the scope of use or functionality of the invention. Moreover, the computing system environment should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, mobile telephones, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • The invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
  • An interface in the context of a software architecture includes a software module, component, code portion, or other sequence of computer-executable instructions. The interface includes, for example, a first module accessing a second module to perform computing tasks on behalf of the first module. The first and second modules include, in one example, application programming interfaces (APIs) such as provided by operating systems, component object model (COM) interfaces (e.g., for peer-to-peer application communication), and extensible markup language metadata interchange format (XMI) interfaces (e.g., for communication between web services).
  • The interface may be a tightly coupled, synchronous implementation such as in Java 2 Platform Enterprise Edition (J2EE), COM, or distributed COM (DCOM) examples. Alternatively or in addition, the interface may be a loosely coupled, asynchronous implementation such as in a web service (e.g., using the simple object access protocol). In general, the interface includes any combination of the following characteristics: tightly coupled, loosely coupled, synchronous, and asynchronous. Further, the interface may conform to a standard protocol, a proprietary protocol, or any combination of standard and proprietary protocols.
  • The interfaces described herein may all be part of a single interface or may be implemented as separate interfaces or any combination therein. The interfaces may execute locally or remotely to provide functionality. Further, the interfaces may include additional or less functionality than illustrated or described herein.
  • In operation, computer 130 executes computer-executable instructions such as those illustrated in the figures to determine and assign application and isolation identities to enable the management of a plurality of applications on a computing system.
  • The order of execution or performance of the methods illustrated and described herein is not essential, unless otherwise specified. That is, elements of the methods may be performed in any order, unless otherwise specified, and that the methods may include more or less elements than those disclosed herein.
  • When introducing elements of the present invention or the embodiment(s) thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
  • In view of the above, it will be seen that the several objects of the invention are achieved and other advantageous results attained.
  • As various changes could be made in the above constructions, products, and methods without departing from the scope of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.

Claims (37)

1. A method for managing a plurality of applications on a computing system, said method comprising:
assigning an application identity to an application program, said assigned application identity differentiating the application program from other application programs;
assigning a resource identity to a resource associated with the application program; and
relating the assigned application identity and the assigned resource identity.
2. The method of claim 1, wherein assigning the application identity to the application program comprises assigning the application identity to the application program based on one or more of the following: a manifest associated with the application program, an assessment of a plurality of files associated with the application program, a hash of the application program, and an installer identity corresponding to an installation program associated with the application program.
3. The method of claim 2, wherein assigning the application identity to the application program further comprises extracting metadata from one or more of the following: the manifest, the assessment, the hash, and the installer identity.
4. The method of claim 1, wherein assigning the resource identity to the resource comprises assigning the application identity to an operating system object.
5. The method of claim 4, further comprising assigning the operating system object to the application program based on one or more of the following: the assigned application identity, a manifest associated with the application program, and additional metadata describing the operating system object.
6. The method of claim 1, wherein assigning the resource identity to the resource comprises assigning the resource identity to the application program based on one or more of the following: the assigned application identity, a manifest associated with the application program, an assessment of the resource, and a hash of the resource.
7. The method of claim 1, further comprising determining an isolation identity for the application program, said isolation identity being associated with at least one other application program having another application identity associated therewith.
8. The method of claim 1, further comprising determining an isolation identity for the application program, said isolation identity being different from another isolation identity of another application program having another application identity associated therewith.
9. The method of claim 1, further comprising:
receiving a request to transition the application program from the assigned application identity to another application identity associated with another application program; and
responsive to the received request, assigning the other application identity to the application program.
10. The method of claim 1, wherein assigning the application identity to the application program comprises determining one or more of the following for the application program: an application vendor, an application name, an application version, and a checksum.
11. The method of claim 1, wherein assigning the resource identity to the resource comprises including a portion of the assigned application identity with the assigned resource identity
12. The method of claim 1, wherein assigning the resource identity to the resource comprises assigning the resource identity to the resource when the resource is created during execution of the application program.
13. The method of claim 1, further comprising parsing the application program to generate a signature associated with the application program, and wherein assigning the application identity to the application program comprises identifying a pre-assigned application identity for the application program based on the generated signature.
14. The method of claim 1, further comprising:
receiving a request from the application program for an operating system resource;
responsive to the received request, determining whether a particular version of the operating system resource exists for the application program based on the assigned application identity;
providing the application program with the particular version if the particular version exists for the application program responsive to said determining; and
otherwise generating the particular version and providing the generated, particular version to the application program responsive to said determining.
15. The method of claim 1, wherein one or more computer-readable media have computer-executable instructions for performing the method recited in claim 1.
16. A method of enabling an operating system to protect a resource associated therewith from modification by an application program, the method comprising:
assigning an identity to an application program;
receiving a request from the application program for an operating system resource;
responsive to the received request, determining whether a particular version of the operating system resource exists for the application program based on the identity;
providing the application program with the particular version if the particular version exists for the application program responsive to said determining; and
otherwise generating the particular version and providing the generated, particular version to the application program responsive to said determining.
17. The method of claim 16, wherein assigning the identity to the application program comprises one or more of the following: obtaining the identity from a manifest associated with the application program, obtaining the identity from an installation program associated with the application program, and calculating the identity based on an assessment of a plurality of files associated with the application program.
18. The method of claim 16, wherein receiving the request from the application program comprises receiving the request for one or more of the following; a file, a folder, an object, and an operating system property value.
19. The method of claim 16, wherein one or more computer-readable media have computer-executable instructions for performing the method of claim 15.
20. One or more computer-readable media having computer-executable components for managing a plurality of applications on a computing system, said components comprising:
a creator component to assign an application identity to an application program, said assigned application identity differentiating the application program from other application programs;
a revision component to assign a resource identity to a resource associated with the application program; and
an assignment component to relate the assigned application identity and the assigned resource identity.
21. The computer-readable media of claim 20, further comprising a virtualization component to:
receive a request from the application program for an operating system resource;
responsive to the received request, determine whether a particular version of the operating system resource exists for the application program based on the assigned application identity;
provide the application program with the particular version if the particular version exists for the application program responsive to said determining; and
otherwise generate the particular version and provide the generated, particular version to the application program responsive to said determining.
22. The computer-readable media of claim 20, further comprising a group component to determine an isolation identity for the application program, said isolation identity being associated with one or more application programs having application identities associated therewith.
23. The computer-readable media of claim 20, further comprising an impersonation component to:
receive a request to transition the application program from the assigned application identity to another application identity associated with another application program; and
responsive to the received request, assign the other application identity to the application program.
24. A system for managing a plurality of application programs via an application identity associated with each of the plurality of application programs, said system comprising:
an operating system having an operating system resource associated therewith;
a memory area to store an application program and an application identity associated therewith; and
a processor programmed to communicate with the operating system and the memory area to:
receive a request from the application program for the operating system resource;
provide, responsive to the received request, a particular version of the operating system resource to the application program based on the application identity.
25. The system of claim 24, wherein the memory area is further adapted to store an isolation identity associated with the application program, said isolation identity being associated with at least one other application program having another application identity associated therewith.
26. The system of claim 24, wherein the application program has a plurality of resources associated therewith, and wherein the processor is further adapted to communicate with the operating system and the memory area to acquire the application identity of the application program to perform an action over the plurality of resources associated with the application program.
27. The system of claim 26, wherein the processor executes the application program.
28. The system of claim 24, further comprising means for assigning the identity to the application program.
29. The system of claim 24, further comprising means for assigning a resource identity to a resource associated with the application program.
30. A computer-readable medium having stored thereon a data structure representing an identity context associated with a software product, said data structure comprising:
an application identity field storing a value identifying the software product; and
an isolation identity field storing a value associated with a group of software products to which the software product belongs.
31. The computer-readable medium of claim 30, wherein the software product and the group of software products share a common resource.
32. The computer-readable medium of claim 30, further comprising a resource identity field to be associated with a resource created by the software product, said resource identity field storing a value identifying the software product.
33. The computer-readable medium of claim 32, wherein the value stored in the application identity field and the value stored in the resource identity field are the same.
34. The computer-readable medium of claim 32, wherein the resource comprises one or more of the following; a process, a thread, a file, a system setting, operating system namespace, a name in the operating system namespace, and an operating system object.
35. The computer-readable medium of claim 32, wherein the resource identity field comprises a creator context and a revised context, said creator context storing the value identifying the software product which created the resource and said revised context storing another value representing an identity associated with the resource.
36. The computer-readable medium of claim 30, further comprising a data attribute storing a value identifying a method used to generate the value stored in the application identity field and the value stored in the isolation identity field.
37. The computer-readable medium of claim 36, wherein the data attribute comprises an installer element, said installer element indicating that a specific installation program populated the value stored in the application identity field and the value stored in the isolation identity field.
US10/868,183 2003-10-24 2004-06-15 Application identity for software products Abandoned US20050091535A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US10/868,183 US20050091535A1 (en) 2003-10-24 2004-06-15 Application identity for software products
US10/938,126 US20050091655A1 (en) 2003-10-24 2004-09-10 Associating runtime objects with a set and controlling access to resources as a function thereof
EP04023382A EP1526454A3 (en) 2003-10-24 2004-09-30 Application identity for software products
US10/963,479 US20050091192A1 (en) 2003-10-24 2004-10-12 Dynamically identifying dependent files of an application program or an operating system
CN200410088300.6A CN1617099A (en) 2003-10-24 2004-10-22 Application identity for software products
KR1020040084703A KR20050039634A (en) 2003-10-24 2004-10-22 Application identity for software products
JP2004308916A JP2005129063A (en) 2003-10-24 2004-10-22 Application id for software products

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US51394103P 2003-10-24 2003-10-24
US10/868,183 US20050091535A1 (en) 2003-10-24 2004-06-15 Application identity for software products

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/938,126 Continuation-In-Part US20050091655A1 (en) 2003-10-24 2004-09-10 Associating runtime objects with a set and controlling access to resources as a function thereof

Publications (1)

Publication Number Publication Date
US20050091535A1 true US20050091535A1 (en) 2005-04-28

Family

ID=34396617

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/868,183 Abandoned US20050091535A1 (en) 2003-10-24 2004-06-15 Application identity for software products
US10/938,126 Abandoned US20050091655A1 (en) 2003-10-24 2004-09-10 Associating runtime objects with a set and controlling access to resources as a function thereof
US10/963,479 Abandoned US20050091192A1 (en) 2003-10-24 2004-10-12 Dynamically identifying dependent files of an application program or an operating system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/938,126 Abandoned US20050091655A1 (en) 2003-10-24 2004-09-10 Associating runtime objects with a set and controlling access to resources as a function thereof
US10/963,479 Abandoned US20050091192A1 (en) 2003-10-24 2004-10-12 Dynamically identifying dependent files of an application program or an operating system

Country Status (5)

Country Link
US (3) US20050091535A1 (en)
EP (1) EP1526454A3 (en)
JP (1) JP2005129063A (en)
KR (1) KR20050039634A (en)
CN (1) CN1617099A (en)

Cited By (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091538A1 (en) * 2003-10-27 2005-04-28 Alcatel Method, a network protection means, a network node, a network, and a computer software product for disinfection
US20060021061A1 (en) * 2004-07-07 2006-01-26 Fabio Cerri Method and apparatus for metering usage of software products using multiple signatures
US20060070029A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for providing file-type associations to multiple applications
US20060069787A1 (en) * 2004-09-09 2006-03-30 Sinclair John W System, method and apparatus for use in monitoring or controlling internet access
US20060070030A1 (en) * 2004-09-30 2006-03-30 Laborczfalvi Lee G Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers
US20060069662A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for remapping accesses to virtual system resources
US20060075381A1 (en) * 2004-09-30 2006-04-06 Citrix Systems, Inc. Method and apparatus for isolating execution of software applications
US20060074989A1 (en) * 2004-09-30 2006-04-06 Laborczfalvi Lee G Method and apparatus for virtualizing object names
US20060090171A1 (en) * 2004-09-30 2006-04-27 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US20070067321A1 (en) * 2005-09-19 2007-03-22 Bissett Nicholas A Method and system for locating and accessing resources
US20070083522A1 (en) * 2005-10-07 2007-04-12 Nord Joseph H Method and a system for responding locally to requests for file metadata associated with files stored remotely
US20070083655A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Methods for selecting between a predetermined number of execution methods for an application program
US20070083501A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Method and system for accessing a remote file in a directory structure associated with an application program executing locally
US20070130167A1 (en) * 2005-12-02 2007-06-07 Citrix Systems, Inc. Systems and methods for providing authentication credentials across application environments
US20070150956A1 (en) * 2005-12-28 2007-06-28 Sharma Rajesh K Real time lockdown
US20080010368A1 (en) * 2006-07-10 2008-01-10 Dan Hubbard System and method of analyzing web content
US20080235664A1 (en) * 2006-05-23 2008-09-25 Giancarlo Carbone Method, system and computer program for discovering multi-component software products
US20080235790A1 (en) * 2007-03-23 2008-09-25 Microsoft Corporation Secure isolation of application pools
US20080256187A1 (en) * 2005-06-22 2008-10-16 Blackspider Technologies Method and System for Filtering Electronic Messages
US20080282354A1 (en) * 2007-05-07 2008-11-13 Microsoft Corporation Access control based on program properties
US20080307489A1 (en) * 2007-02-02 2008-12-11 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US20090172160A1 (en) * 2008-01-02 2009-07-02 Sepago Gmbh Loading of server-stored user profile data
US7567984B1 (en) * 2006-08-31 2009-07-28 Symantec Operating Corporation Operating system and application deployment based on stored user state and organizational policy
US20090216729A1 (en) * 2003-03-14 2009-08-27 Websense, Inc. System and method of monitoring and controlling application files
US20090241173A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US20090241197A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. System and method for analysis of electronic information dissemination events
US20090241187A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US20090241196A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US20090265451A1 (en) * 2008-04-17 2009-10-22 E.S.I. Software Ltd. Assisted application definition
US20090328180A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Granting Least Privilege Access For Computing Processes
US20100030990A1 (en) * 2005-09-15 2010-02-04 Ntt Docomo, Inc. External memory management apparatus and external memory management method
US20100115615A1 (en) * 2008-06-30 2010-05-06 Websense, Inc. System and method for dynamic and real-time categorization of webpages
US20100118330A1 (en) * 2008-11-07 2010-05-13 Ricardo Fernando Feijoo Systems and Methods for Managing Printer Settings in a Networked Computing Environment
US20100154058A1 (en) * 2007-01-09 2010-06-17 Websense Hosted R&D Limited Method and systems for collecting addresses for remotely accessible information sources
US7756841B2 (en) 2005-03-22 2010-07-13 Microsoft Corporation System and method for identity decisions and invalidation
US20100212008A1 (en) * 2009-02-19 2010-08-19 Microsoft Corporation Identification Security Elevation
US20100217811A1 (en) * 2007-05-18 2010-08-26 Websense Hosted R&D Limited Method and apparatus for electronic mail filtering
US20100217771A1 (en) * 2007-01-22 2010-08-26 Websense Uk Limited Resource access filtering system and database structure for use therewith
US20100281102A1 (en) * 2009-05-02 2010-11-04 Chinta Madhav Methods and systems for launching applications into existing isolation environments
US20110035805A1 (en) * 2009-05-26 2011-02-10 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US7890642B2 (en) 2004-08-07 2011-02-15 Websense Uk Limited Device internet resource access filtering system and method
US20110209139A1 (en) * 2010-02-23 2011-08-25 Lutz Dominick Application platform
US8015174B2 (en) 2007-02-28 2011-09-06 Websense, Inc. System and method of controlling access to the internet
US8051298B1 (en) * 2005-11-29 2011-11-01 Sprint Communications Company L.P. Integrated fingerprinting in configuration audit and management
US8141147B2 (en) 2004-09-09 2012-03-20 Websense Uk Limited System, method and apparatus for use in monitoring or controlling internet access
US8171483B2 (en) 2007-10-20 2012-05-01 Citrix Systems, Inc. Method and system for communicating between isolation environments
US20130013614A1 (en) * 2011-07-07 2013-01-10 1E Limited Identifying Software
US8489616B2 (en) * 2011-07-07 2013-07-16 1E Limited Identifying software
US20130185796A1 (en) * 2009-04-15 2013-07-18 International Business Machines Corporation Method and apparatus for secure and reliable computing
WO2013115493A1 (en) * 2012-02-02 2013-08-08 Samsung Electronics Co., Ltd. Method and apparatus for managing an application in a mobile electronic device
US20130247177A1 (en) * 2012-03-14 2013-09-19 Samsung Electronics Co., Ltd Apparatus and method of controlling permission to applications in a portable terminal
US8615800B2 (en) 2006-07-10 2013-12-24 Websense, Inc. System and method for analyzing web content
US8701194B2 (en) 2003-03-14 2014-04-15 Websense, Inc. System and method of monitoring and controlling application files
US8990561B2 (en) * 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9117054B2 (en) 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
US9118686B2 (en) 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US9442752B1 (en) 2014-09-03 2016-09-13 Amazon Technologies, Inc. Virtual secure execution environments
US9491111B1 (en) 2014-09-03 2016-11-08 Amazon Technologies, Inc. Securing service control on third party hardware
US20160357544A1 (en) * 2015-06-05 2016-12-08 Apple Inc. On demand resources
US9521140B2 (en) 2014-09-03 2016-12-13 Amazon Technologies, Inc. Secure execution environment services
US9577829B1 (en) 2014-09-03 2017-02-21 Amazon Technologies, Inc. Multi-party computation services
US9584517B1 (en) * 2014-09-03 2017-02-28 Amazon Technologies, Inc. Transforms within secure execution environments
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
US9733929B1 (en) * 2010-07-20 2017-08-15 Symantec Corporation Systems and methods for restoring applications
US9754116B1 (en) 2014-09-03 2017-09-05 Amazon Technologies, Inc. Web services in secure execution environments
US9773102B2 (en) 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
US10044695B1 (en) * 2014-09-02 2018-08-07 Amazon Technologies, Inc. Application instances authenticated by secure measurements
US10061915B1 (en) 2014-09-03 2018-08-28 Amazon Technologies, Inc. Posture assessment in a secure execution environment
US10079681B1 (en) 2014-09-03 2018-09-18 Amazon Technologies, Inc. Securing service layer on third party hardware
US20190155597A1 (en) * 2016-08-05 2019-05-23 Oracle International Corporation Zero Down Time Upgrade for a Multi-Tenant Identity and Data Security Management Cloud Service
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
US10693861B2 (en) 2016-05-11 2020-06-23 Oracle International Corporation Task segregation in a multi-tenant identity and data security management cloud service
US10721237B2 (en) 2016-08-05 2020-07-21 Oracle International Corporation Hierarchical processing for a virtual directory system for LDAP to SCIM proxy service
US10735394B2 (en) 2016-08-05 2020-08-04 Oracle International Corporation Caching framework for a multi-tenant identity and data security management cloud service
US10791087B2 (en) 2016-09-16 2020-09-29 Oracle International Corporation SCIM to LDAP mapping using subtype attributes
US10848543B2 (en) 2016-05-11 2020-11-24 Oracle International Corporation Security tokens for a multi-tenant identity and data security management cloud service
US10878079B2 (en) 2016-05-11 2020-12-29 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
US11088993B2 (en) 2016-05-11 2021-08-10 Oracle International Corporation Policy enforcement point for a multi-tenant identity and data security management cloud service
US11356454B2 (en) 2016-08-05 2022-06-07 Oracle International Corporation Service discovery for a multi-tenant identity and data security management cloud service

Families Citing this family (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7739381B2 (en) 1998-03-11 2010-06-15 Commvault Systems, Inc. System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
US7822980B2 (en) * 2002-03-15 2010-10-26 International Business Machines Corporation Authenticated identity propagation and translation within a multiple computing unit environment
US8370542B2 (en) 2002-09-16 2013-02-05 Commvault Systems, Inc. Combined stream auxiliary copy system and method
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
US20050091535A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Application identity for software products
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
JP2005149164A (en) * 2003-11-17 2005-06-09 Hitachi Ltd Method for calling external disclosure function stored in shared library
US7328217B2 (en) * 2003-11-26 2008-02-05 Symantec Operating Corporation System and method for detecting and storing file identity change information within a file system
US8775823B2 (en) 2006-12-29 2014-07-08 Commvault Systems, Inc. System and method for encrypting secondary copies of data
US7703135B2 (en) * 2004-12-21 2010-04-20 International Business Machines Corporation Accessing protected resources via multi-identity security environments
US7716743B2 (en) * 2005-01-14 2010-05-11 Microsoft Corporation Privacy friendly malware quarantines
US7979405B2 (en) * 2005-01-14 2011-07-12 Microsoft Corporation Method for automatically associating data with a document based on a prescribed type of the document
EP1684151A1 (en) * 2005-01-20 2006-07-26 Grant Rothwell William Computer protection against malware affection
US7966286B2 (en) * 2005-02-14 2011-06-21 Microsoft Corporation Hierarchical management of object schema and behavior
US7653653B2 (en) * 2005-02-14 2010-01-26 Microsoft Corporation Dynamically configurable lists for including multiple content types
EP1693765B1 (en) * 2005-02-16 2014-07-09 Sap Ag A data processing system and method
US20060265387A1 (en) * 2005-05-20 2006-11-23 International Business Machines Corporation Method and apparatus for loading artifacts
US8320880B2 (en) 2005-07-20 2012-11-27 Qualcomm Incorporated Apparatus and methods for secure architectures in wireless networks
US8307355B2 (en) * 2005-07-22 2012-11-06 International Business Machines Corporation Method and apparatus for populating a software catalogue with software knowledge gathering
DE102005041628B4 (en) * 2005-09-01 2012-12-27 Siemens Ag Apparatus and method for processing data of different modalities
JP4361522B2 (en) 2005-09-15 2009-11-11 株式会社エヌ・ティ・ティ・ドコモ External memory management device and external memory management method
US7685297B2 (en) 2005-12-06 2010-03-23 Nokia Corporation Resource control
US8375122B2 (en) * 2005-12-15 2013-02-12 International Business Machines Corporation Web service information management in service-oriented architecture applications
KR100740252B1 (en) * 2006-01-06 2007-07-18 (주)하이비젼시스템 USB Interface Method using one and the same VID/PID
US20070198542A1 (en) * 2006-02-09 2007-08-23 Morris Robert P Methods, systems, and computer program products for associating a persistent information element with a resource-executable pair
US20070256076A1 (en) * 2006-04-27 2007-11-01 Thompson James W System and method for separating multiple workloads processing in a single computer operating environment
US8769703B2 (en) * 2006-04-27 2014-07-01 Unisys Corporation System and method for providing a mechanism to virtualize a perpetual, unique system identity on a partitioned computer system
US8528087B2 (en) * 2006-04-27 2013-09-03 Robot Genius, Inc. Methods for combating malicious software
US7890756B2 (en) * 2006-06-14 2011-02-15 International Business Machines Corporation Verification system and method for accessing resources in a computing environment
US20080040404A1 (en) * 2006-08-11 2008-02-14 Microsoft Corporation Host computer I/O filter re-directing potentially conflicting I/O commands from instantiations of legacy application
US7761559B2 (en) * 2006-10-13 2010-07-20 International Business Machines Corporation System and method of remotely managing and loading artifacts
US7720931B2 (en) * 2006-10-13 2010-05-18 International Business Machines Corporation System and method of remotely managing and loading artifacts
US8655914B2 (en) * 2006-10-17 2014-02-18 Commvault Systems, Inc. System and method for storage operation access security
US20080127162A1 (en) * 2006-11-29 2008-05-29 Sap Ag Method and apparatus for configuring application software
US9754273B2 (en) * 2006-12-19 2017-09-05 Microsoft Technology Licensing, Llc Enterprise resource tracking of knowledge
US8850414B2 (en) * 2007-02-02 2014-09-30 Microsoft Corporation Direct access of language metadata
US8127271B2 (en) * 2007-03-02 2012-02-28 International Business Machines Corporation Method and system for accessing a resource implemented in a computer network
US7870277B2 (en) * 2007-03-12 2011-01-11 Citrix Systems, Inc. Systems and methods for using object oriented expressions to configure application security policies
US7853678B2 (en) * 2007-03-12 2010-12-14 Citrix Systems, Inc. Systems and methods for configuring flow control of policy expressions
US7853679B2 (en) * 2007-03-12 2010-12-14 Citrix Systems, Inc. Systems and methods for configuring handling of undefined policy events
US7865589B2 (en) 2007-03-12 2011-01-04 Citrix Systems, Inc. Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
US8631147B2 (en) 2007-03-12 2014-01-14 Citrix Systems, Inc. Systems and methods for configuring policy bank invocations
US8490148B2 (en) * 2007-03-12 2013-07-16 Citrix Systems, Inc Systems and methods for managing application security profiles
US20080270974A1 (en) * 2007-04-30 2008-10-30 Krasimir Topchiyski Enterprise JavaBeans Metadata Model
JP5058697B2 (en) * 2007-07-19 2012-10-24 キヤノン株式会社 Information processing apparatus, application management method, and computer program
WO2009047438A1 (en) * 2007-09-18 2009-04-16 Thomson Licensing Semi-permament application hosting
US8156146B2 (en) 2007-09-28 2012-04-10 Xcerion Aktiebolag Network file system
US8140501B2 (en) * 2007-11-28 2012-03-20 International Business Machines Corporation Attribute presenter of object attributes and method for presenting object attributes using the attribute presenter
US8495594B2 (en) * 2008-01-10 2013-07-23 International Business Machines Corporation Method and system for providing a componentized resource adapter architecture
US8620856B2 (en) * 2008-01-18 2013-12-31 International Business Machines Corporation Method and system for providing a data exchange service provider interface
US8055649B2 (en) 2008-03-06 2011-11-08 Microsoft Corporation Scaled management system
US8281410B1 (en) * 2008-03-31 2012-10-02 Symantec Corporation Methods and systems for providing resource-access information
US8950007B1 (en) * 2008-04-07 2015-02-03 Lumension Security, Inc. Policy-based whitelisting with system change management based on trust framework
US9779234B2 (en) * 2008-06-18 2017-10-03 Symantec Corporation Software reputation establishment and monitoring system and method
US9626511B2 (en) * 2008-08-26 2017-04-18 Symantec Corporation Agentless enforcement of application management through virtualized block I/O redirection
US8434131B2 (en) * 2009-03-20 2013-04-30 Commvault Systems, Inc. Managing connections in a data storage system
JP5402169B2 (en) * 2009-03-31 2014-01-29 富士通株式会社 Execution control program and information processing system
US8495621B2 (en) * 2009-06-15 2013-07-23 Microsoft Corporation Catalog-based software component management
US8826269B2 (en) * 2009-06-15 2014-09-02 Microsoft Corporation Annotating virtual application processes
KR101255983B1 (en) * 2009-07-21 2013-04-23 한국전자통신연구원 Apparatus equipped with component based software platform and method for managing application individual using the same
US8321857B1 (en) * 2009-09-14 2012-11-27 Symantec Corporation Automated generation of application data for application distribution
US9088580B2 (en) * 2009-12-31 2015-07-21 Microsoft Technology Licensing, Llc Access control based on user and service
US8826407B2 (en) * 2010-11-24 2014-09-02 Skai, Inc. System and method for access control and identity management
US8756611B2 (en) * 2010-12-07 2014-06-17 International Business Machines Corporation Delayed expansion of values in context
US9858092B2 (en) * 2011-01-06 2018-01-02 Mitel Networks Corporation Contextual application launch via search query
US20120179707A1 (en) 2011-01-06 2012-07-12 Mitel Networks Corporation Range programming using a search query
US9104514B2 (en) * 2011-01-11 2015-08-11 International Business Machines Corporation Automated deployment of applications with tenant-isolation requirements
US8650640B2 (en) 2011-02-24 2014-02-11 International Business Machines Corporation Using a declaration of security requirements to determine whether to permit application operations
US9244818B1 (en) * 2011-03-29 2016-01-26 Amazon Technologies, Inc. Automated selection of quality control tests to run on a software application
CN102955705B (en) * 2011-08-26 2015-08-19 腾讯科技(深圳)有限公司 A kind of method and system realizing starting mutually between program
US20130061316A1 (en) * 2011-09-06 2013-03-07 Microsoft Corporation Capability Access Management for Processes
US9934229B2 (en) * 2011-10-23 2018-04-03 Microsoft Technology Licensing, Llc Telemetry file hash and conflict detection
US9052961B2 (en) * 2012-03-02 2015-06-09 Vmware, Inc. System to generate a deployment plan for a cloud infrastructure according to logical, multi-tier application blueprint
CN103544432A (en) 2012-07-11 2014-01-29 腾讯科技(深圳)有限公司 Method and device for prompting user to uninstall program
US9135034B2 (en) 2012-08-16 2015-09-15 Microsoft Technology Licensing, Llc Imperative attribution for elements in managed runtimes
US9104781B2 (en) 2012-08-28 2015-08-11 Microsoft Technology Licensing, Llc Obtaining metadata set by imperative statement
US9582332B2 (en) * 2012-08-31 2017-02-28 Intel Corporation Enabling a cloud to effectively assign workloads to servers
US8893152B2 (en) 2012-09-06 2014-11-18 Intel Corporation Application registration with a non-OS service
US20140082023A1 (en) * 2012-09-14 2014-03-20 Empire Technology Development Llc Associating an identity to a creator of a set of visual files
US9195438B2 (en) * 2012-12-19 2015-11-24 Salesforce.Com, Inc. System, method and computer program product for creating an application within a system
US9483655B2 (en) 2013-03-12 2016-11-01 Commvault Systems, Inc. File backup with selective encryption
CN103246595B (en) 2013-04-08 2016-06-08 小米科技有限责任公司 Application management method, device, server and terminating unit
CN103399788B (en) * 2013-08-07 2017-03-08 广东欧珀移动通信有限公司 A kind of across the application control method and system of intelligent terminal
US9544293B2 (en) 2013-09-20 2017-01-10 Oracle International Corporation Global unified session identifier across multiple data centers
US9866640B2 (en) 2013-09-20 2018-01-09 Oracle International Corporation Cookie based session management
CN103942076B (en) * 2014-04-11 2017-05-24 珠海市君天电子科技有限公司 Integral wall information acquisition method and device
US9659182B1 (en) 2014-04-30 2017-05-23 Symantec Corporation Systems and methods for protecting data files
US9405928B2 (en) 2014-09-17 2016-08-02 Commvault Systems, Inc. Deriving encryption rules based on file content
CN104376273A (en) * 2014-11-18 2015-02-25 乐视致新电子科技(天津)有限公司 Data access control method and device
US9904481B2 (en) 2015-01-23 2018-02-27 Commvault Systems, Inc. Scalable auxiliary copy processing in a storage management system using media agent resources
US9898213B2 (en) 2015-01-23 2018-02-20 Commvault Systems, Inc. Scalable auxiliary copy processing using media agent resources
US9934269B1 (en) * 2015-03-17 2018-04-03 Amazon Technologies, Inc. Resource tagging and grouping
US10496692B1 (en) 2015-03-17 2019-12-03 Amazon Technologies, Inc. Resource tagging and grouping
US9769147B2 (en) 2015-06-29 2017-09-19 Oracle International Corporation Session activity tracking for session adoption across multiple data centers
US10693859B2 (en) 2015-07-30 2020-06-23 Oracle International Corporation Restricting access for a single sign-on (SSO) session
US9875373B2 (en) * 2015-09-28 2018-01-23 International Business Machines Corporation Prioritization of users during disaster recovery
US10581826B2 (en) 2015-10-22 2020-03-03 Oracle International Corporation Run-time trust management system for access impersonation
US10454936B2 (en) 2015-10-23 2019-10-22 Oracle International Corporation Access manager session management strategy
US10505982B2 (en) 2015-10-23 2019-12-10 Oracle International Corporation Managing security agents in a distributed environment
NL2016667B1 (en) * 2016-04-22 2017-11-16 Winc Solutions B V Method for installing and updating software programs, corresponding server and software package.
US20170329985A1 (en) * 2016-05-10 2017-11-16 Cyber-Ark Software Ltd. Application control
RU2634177C1 (en) * 2016-05-20 2017-10-24 Акционерное общество "Лаборатория Касперского" System and method for unwanted software detection
US10073974B2 (en) * 2016-07-21 2018-09-11 International Business Machines Corporation Generating containers for applications utilizing reduced sets of libraries based on risk analysis
US10621333B2 (en) * 2016-08-08 2020-04-14 International Business Machines Corporation Install-time security analysis of mobile applications
US10572245B1 (en) * 2016-08-30 2020-02-25 Amazon Technologies, Inc. Identifying versions of running programs using signatures derived from object files
US10623501B2 (en) 2016-09-15 2020-04-14 Oracle International Corporation Techniques for configuring sessions across clients
US11082491B2 (en) 2016-10-07 2021-08-03 Microsoft Technology Licensing, Llc Propagating origin information for applications during application installation
US11010261B2 (en) 2017-03-31 2021-05-18 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US10365910B2 (en) * 2017-07-06 2019-07-30 Citrix Systems, Inc. Systems and methods for uninstalling or upgrading software if package cache is removed or corrupted
US11290438B2 (en) 2017-07-07 2022-03-29 Oracle International Corporation Managing session access across multiple data centers
CN109240809B (en) * 2017-07-11 2022-08-23 阿里巴巴集团控股有限公司 Process maintenance management method, container maintenance method, device and operating system
US11050730B2 (en) 2017-09-27 2021-06-29 Oracle International Corporation Maintaining session stickiness across authentication and authorization channels for access management
US10157275B1 (en) 2017-10-12 2018-12-18 Oracle International Corporation Techniques for access management based on multi-factor authentication including knowledge-based authentication
US11275850B1 (en) * 2018-01-30 2022-03-15 Amazon Technologies, Inc. Multi-faceted security framework for unstructured storage objects
US11134078B2 (en) 2019-07-10 2021-09-28 Oracle International Corporation User-specific session timeouts
US20210342308A1 (en) * 2020-04-30 2021-11-04 Unity IPR ApS System and method for performing context aware operating file system virtualization

Citations (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4755939A (en) * 1985-12-04 1988-07-05 International Computers Limited Garbage collection in a computer system
US4972343A (en) * 1987-07-16 1990-11-20 Nec Corporation Knowledge processing system
US5311591A (en) * 1992-05-15 1994-05-10 Fischer Addison M Computer system security method and apparatus for creating and using program authorization information data structures
US5313646A (en) * 1989-02-24 1994-05-17 Sun Microsystems, Inc. Method and apparatus for translucent file system
US5560005A (en) * 1994-02-25 1996-09-24 Actamed Corp. Methods and systems for object-based relational distributed databases
US5666533A (en) * 1991-09-06 1997-09-09 International Business Machines Corporation Program execution management using process enclaves which define the scope of high-level language semantics and threads improving cooperation between processes written in multiple languages
US5799306A (en) * 1996-06-21 1998-08-25 Oracle Corporation Method and apparatus for facilitating data replication using object groups
US5915085A (en) * 1997-02-28 1999-06-22 International Business Machines Corporation Multiple resource or security contexts in a multithreaded application
US20010029605A1 (en) * 1998-06-19 2001-10-11 Jonathan A. Forbes Software package management
US20010030970A1 (en) * 1999-12-21 2001-10-18 Santa Wiryaman Integrated access point network device
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
US6317143B1 (en) * 1999-01-26 2001-11-13 Gateway, Inc. Programmable graphical user interface control system and method
US6327628B1 (en) * 2000-05-19 2001-12-04 Epicentric, Inc. Portal server that provides a customizable user Interface for access to computer networks
US20010056463A1 (en) * 2000-06-20 2001-12-27 Grady James D. Method and system for linking real world objects to digital objects
US6378127B1 (en) * 1998-09-21 2002-04-23 Microsoft Corporation Software installation and validation using custom actions
US6385707B1 (en) * 1998-02-24 2002-05-07 Adaptec, Inc. Method and apparatus for backing up a disk drive upon a system failure
US20020083064A1 (en) * 2000-12-26 2002-06-27 Davis Ray Charles Server-side recycle bin system
US20020087665A1 (en) * 2000-12-29 2002-07-04 Marshall Donald Brent Method and system for integrated resource management
US20020099952A1 (en) * 2000-07-24 2002-07-25 Lambert John J. Policies for secure software execution
US20020100017A1 (en) * 2000-04-24 2002-07-25 Microsoft Corporation Configurations for binding software assemblies to application programs
US20020174127A1 (en) * 2001-03-07 2002-11-21 Otto Preiss Data organization system and method for classification structure management
US6505300B2 (en) * 1998-06-12 2003-01-07 Microsoft Corporation Method and system for secure running of untrusted content
US20030126592A1 (en) * 1998-09-21 2003-07-03 Mishra Debi P. Method and system for on-demand installation of software implementations
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20030167356A1 (en) * 2001-07-10 2003-09-04 Smith Adam W. Application program interface for network software platform
US20030172109A1 (en) * 2001-01-31 2003-09-11 Dalton Christoper I. Trusted operating system
US6640317B1 (en) * 2000-04-20 2003-10-28 International Business Machines Corporation Mechanism for automated generic application damage detection and repair in strongly encapsulated application
US20030204730A1 (en) * 2002-04-29 2003-10-30 Barmettler James W. Secure transmission and installation of an application
US20030208680A1 (en) * 1996-06-28 2003-11-06 Shannon Byrne System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
US20040003390A1 (en) * 2002-06-27 2004-01-01 Microsoft Corporation System and method for installing a software application in a non-impactfull manner
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software
US20040054896A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Event driven security objects
US20040220976A1 (en) * 2003-04-29 2004-11-04 International Business Machines Corporation Managing access to objects of a computing environment
US6868539B1 (en) * 2000-06-28 2005-03-15 Microsoft Corp. System and method providing single application image
US20050091185A1 (en) * 2003-10-23 2005-04-28 Oleg Koutyrine System and method for selective local object retrieval
US20050091192A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Dynamically identifying dependent files of an application program or an operating system
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
US7016920B2 (en) * 2001-05-25 2006-03-21 International Business Machines Corporation Method for tracking relationships between specified file name and particular program used for subsequent access in a database
US7028305B2 (en) * 2001-05-16 2006-04-11 Softricity, Inc. Operating system abstraction and protection layer
US7069474B2 (en) * 2002-09-18 2006-06-27 Sun Microsystems, Inc. System and method for assessing compatibility risk
US7178163B2 (en) * 2002-11-12 2007-02-13 Microsoft Corporation Cross platform network authentication and authorization model
US7200760B2 (en) * 2002-12-31 2007-04-03 Protexis, Inc. System for persistently encrypting critical software data to control the operation of an executable software program
US7210125B2 (en) * 2003-07-17 2007-04-24 International Business Machines Corporation Method and system for application installation and management using an application-based naming system including aliases

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US92013A (en) * 1869-06-29 Improvement in breech-loaders
US100017A (en) * 1870-02-22 Joseph m
US3390A (en) * 1843-12-27 Improvement in bloomery-forges employed in the manufacture of wrought-iron
CA2124720C (en) * 1993-06-25 2002-10-22 Michael R. C. Seaman Integration of systems management services with an underlying system object model
US5754854A (en) * 1994-11-14 1998-05-19 Microsoft Corporation Method and system for providing a group of parallel resources as a proxy for a single shared resource
US5825877A (en) * 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US6182086B1 (en) * 1998-03-02 2001-01-30 Microsoft Corporation Client-server computer system with application recovery of server applications and client applications
US6970924B1 (en) * 1999-02-23 2005-11-29 Visual Networks, Inc. Methods and apparatus for monitoring end-user experience in a distributed network
US6584507B1 (en) * 1999-03-02 2003-06-24 Cisco Technology, Inc. Linking external applications to a network management system
US6449617B1 (en) * 1999-06-15 2002-09-10 Microsoft Corporation Edit command delegation program for editing electronic files
US6854108B1 (en) * 2000-05-11 2005-02-08 International Business Machines Corporation Method and apparatus for deterministic replay of java multithreaded programs on multiprocessors
US6973577B1 (en) * 2000-05-26 2005-12-06 Mcafee, Inc. System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
WO2002027486A1 (en) * 2000-09-28 2002-04-04 Curl Corporation Methods and apparatus for generating unique identifiers for software components
US20020083183A1 (en) * 2000-11-06 2002-06-27 Sanjay Pujare Conventionally coded application conversion system for streamed delivery and execution
US7290266B2 (en) * 2001-06-14 2007-10-30 Cisco Technology, Inc. Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy
US7117504B2 (en) * 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US7483970B2 (en) * 2001-12-12 2009-01-27 Symantec Corporation Method and apparatus for managing components in an IT system
US7448084B1 (en) * 2002-01-25 2008-11-04 The Trustees Of Columbia University In The City Of New York System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
US20050033777A1 (en) * 2003-08-04 2005-02-10 Moraes Mark A. Tracking, recording and organizing changes to data in computer systems
GB0327950D0 (en) * 2003-12-03 2004-01-07 Ibm Determining the configuration of a data processing system at the time a transaction was processed

Patent Citations (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4755939A (en) * 1985-12-04 1988-07-05 International Computers Limited Garbage collection in a computer system
US4972343A (en) * 1987-07-16 1990-11-20 Nec Corporation Knowledge processing system
US5313646A (en) * 1989-02-24 1994-05-17 Sun Microsystems, Inc. Method and apparatus for translucent file system
US6073157A (en) * 1991-09-06 2000-06-06 International Business Machines Corporation Program execution in a software run-time environment
US5666533A (en) * 1991-09-06 1997-09-09 International Business Machines Corporation Program execution management using process enclaves which define the scope of high-level language semantics and threads improving cooperation between processes written in multiple languages
US5311591A (en) * 1992-05-15 1994-05-10 Fischer Addison M Computer system security method and apparatus for creating and using program authorization information data structures
US5560005A (en) * 1994-02-25 1996-09-24 Actamed Corp. Methods and systems for object-based relational distributed databases
US5724575A (en) * 1994-02-25 1998-03-03 Actamed Corp. Method and system for object-based relational distributed databases
US5799306A (en) * 1996-06-21 1998-08-25 Oracle Corporation Method and apparatus for facilitating data replication using object groups
US20030208680A1 (en) * 1996-06-28 2003-11-06 Shannon Byrne System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
US5915085A (en) * 1997-02-28 1999-06-22 International Business Machines Corporation Multiple resource or security contexts in a multithreaded application
US6385707B1 (en) * 1998-02-24 2002-05-07 Adaptec, Inc. Method and apparatus for backing up a disk drive upon a system failure
US6505300B2 (en) * 1998-06-12 2003-01-07 Microsoft Corporation Method and system for secure running of untrusted content
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
US20010029605A1 (en) * 1998-06-19 2001-10-11 Jonathan A. Forbes Software package management
US6378127B1 (en) * 1998-09-21 2002-04-23 Microsoft Corporation Software installation and validation using custom actions
US20030126592A1 (en) * 1998-09-21 2003-07-03 Mishra Debi P. Method and system for on-demand installation of software implementations
US20020092013A1 (en) * 1998-09-21 2002-07-11 Microsoft Corporation Software installation and validation using custom actions
US6317143B1 (en) * 1999-01-26 2001-11-13 Gateway, Inc. Programmable graphical user interface control system and method
US20010030970A1 (en) * 1999-12-21 2001-10-18 Santa Wiryaman Integrated access point network device
US6640317B1 (en) * 2000-04-20 2003-10-28 International Business Machines Corporation Mechanism for automated generic application damage detection and repair in strongly encapsulated application
US20020100017A1 (en) * 2000-04-24 2002-07-25 Microsoft Corporation Configurations for binding software assemblies to application programs
US6327628B1 (en) * 2000-05-19 2001-12-04 Epicentric, Inc. Portal server that provides a customizable user Interface for access to computer networks
US20010056463A1 (en) * 2000-06-20 2001-12-27 Grady James D. Method and system for linking real world objects to digital objects
US6868539B1 (en) * 2000-06-28 2005-03-15 Microsoft Corp. System and method providing single application image
US20020099952A1 (en) * 2000-07-24 2002-07-25 Lambert John J. Policies for secure software execution
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software
US20020083064A1 (en) * 2000-12-26 2002-06-27 Davis Ray Charles Server-side recycle bin system
US20020087665A1 (en) * 2000-12-29 2002-07-04 Marshall Donald Brent Method and system for integrated resource management
US20030172109A1 (en) * 2001-01-31 2003-09-11 Dalton Christoper I. Trusted operating system
US20020174127A1 (en) * 2001-03-07 2002-11-21 Otto Preiss Data organization system and method for classification structure management
US7028305B2 (en) * 2001-05-16 2006-04-11 Softricity, Inc. Operating system abstraction and protection layer
US7016920B2 (en) * 2001-05-25 2006-03-21 International Business Machines Corporation Method for tracking relationships between specified file name and particular program used for subsequent access in a database
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20050246716A1 (en) * 2001-07-10 2005-11-03 Microsoft Corporation Application program interface for network software platform
US20030167356A1 (en) * 2001-07-10 2003-09-04 Smith Adam W. Application program interface for network software platform
US20030204730A1 (en) * 2002-04-29 2003-10-30 Barmettler James W. Secure transmission and installation of an application
US20040003390A1 (en) * 2002-06-27 2004-01-01 Microsoft Corporation System and method for installing a software application in a non-impactfull manner
US20040054896A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Event driven security objects
US7069474B2 (en) * 2002-09-18 2006-06-27 Sun Microsystems, Inc. System and method for assessing compatibility risk
US7178163B2 (en) * 2002-11-12 2007-02-13 Microsoft Corporation Cross platform network authentication and authorization model
US7200760B2 (en) * 2002-12-31 2007-04-03 Protexis, Inc. System for persistently encrypting critical software data to control the operation of an executable software program
US20040220976A1 (en) * 2003-04-29 2004-11-04 International Business Machines Corporation Managing access to objects of a computing environment
US7210125B2 (en) * 2003-07-17 2007-04-24 International Business Machines Corporation Method and system for application installation and management using an application-based naming system including aliases
US20050091185A1 (en) * 2003-10-23 2005-04-28 Oleg Koutyrine System and method for selective local object retrieval
US20050091192A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Dynamically identifying dependent files of an application program or an operating system
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection

Cited By (157)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8645340B2 (en) 2003-03-14 2014-02-04 Websense, Inc. System and method of monitoring and controlling application files
US9253060B2 (en) 2003-03-14 2016-02-02 Websense, Inc. System and method of monitoring and controlling application files
US9342693B2 (en) 2003-03-14 2016-05-17 Websense, Inc. System and method of monitoring and controlling application files
US9692790B2 (en) 2003-03-14 2017-06-27 Websense, Llc System and method of monitoring and controlling application files
US20090216729A1 (en) * 2003-03-14 2009-08-27 Websense, Inc. System and method of monitoring and controlling application files
US8150817B2 (en) 2003-03-14 2012-04-03 Websense, Inc. System and method of monitoring and controlling application files
US8701194B2 (en) 2003-03-14 2014-04-15 Websense, Inc. System and method of monitoring and controlling application files
US20050091538A1 (en) * 2003-10-27 2005-04-28 Alcatel Method, a network protection means, a network node, a network, and a computer software product for disinfection
US20060021061A1 (en) * 2004-07-07 2006-01-26 Fabio Cerri Method and apparatus for metering usage of software products using multiple signatures
US7860239B2 (en) * 2004-07-07 2010-12-28 International Business Machines Corporation Method and apparatus for metering usage of software products using multiple signatures
US7890642B2 (en) 2004-08-07 2011-02-15 Websense Uk Limited Device internet resource access filtering system and method
US8024471B2 (en) 2004-09-09 2011-09-20 Websense Uk Limited System, method and apparatus for use in monitoring or controlling internet access
US8141147B2 (en) 2004-09-09 2012-03-20 Websense Uk Limited System, method and apparatus for use in monitoring or controlling internet access
US20060069787A1 (en) * 2004-09-09 2006-03-30 Sinclair John W System, method and apparatus for use in monitoring or controlling internet access
US20060070030A1 (en) * 2004-09-30 2006-03-30 Laborczfalvi Lee G Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers
US20070094667A1 (en) * 2004-09-30 2007-04-26 Bissett Nicholas A Method for accessing, by application programs, resources residing inside an application isolation environment
US20060074989A1 (en) * 2004-09-30 2006-04-06 Laborczfalvi Lee G Method and apparatus for virtualizing object names
US8042120B2 (en) 2004-09-30 2011-10-18 Citrix Systems, Inc. Method and apparatus for moving processes between isolation environments
US8302101B2 (en) 2004-09-30 2012-10-30 Citrix Systems, Inc. Methods and systems for accessing, by application programs, resources provided by an operating system
US8171479B2 (en) 2004-09-30 2012-05-01 Citrix Systems, Inc. Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers
US20060085789A1 (en) * 2004-09-30 2006-04-20 Laborczfalvi Lee G Method and apparatus for moving processes between isolation environments
US20060174223A1 (en) * 2004-09-30 2006-08-03 Muir Jeffrey D Method and environment for associating an application with an isolation environment
US20060070029A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for providing file-type associations to multiple applications
US8132176B2 (en) 2004-09-30 2012-03-06 Citrix Systems, Inc. Method for accessing, by application programs, resources residing inside an application isolation scope
US20060265714A1 (en) * 2004-09-30 2006-11-23 Bissett Nicholas A Methods and systems for accessing, by application programs, resources provided by an operating system
US8117559B2 (en) 2004-09-30 2012-02-14 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US7853947B2 (en) 2004-09-30 2010-12-14 Citrix Systems, Inc. System for virtualizing access to named system objects using rule action associated with request
US20060090171A1 (en) * 2004-09-30 2006-04-27 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US8352964B2 (en) 2004-09-30 2013-01-08 Citrix Systems, Inc. Method and apparatus for moving processes between isolation environments
US20060075381A1 (en) * 2004-09-30 2006-04-06 Citrix Systems, Inc. Method and apparatus for isolating execution of software applications
US7752600B2 (en) 2004-09-30 2010-07-06 Citrix Systems, Inc. Method and apparatus for providing file-type associations to multiple applications
US7680758B2 (en) * 2004-09-30 2010-03-16 Citrix Systems, Inc. Method and apparatus for isolating execution of software applications
US20060069662A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for remapping accesses to virtual system resources
US7756841B2 (en) 2005-03-22 2010-07-13 Microsoft Corporation System and method for identity decisions and invalidation
US8015250B2 (en) 2005-06-22 2011-09-06 Websense Hosted R&D Limited Method and system for filtering electronic messages
US20080256187A1 (en) * 2005-06-22 2008-10-16 Blackspider Technologies Method and System for Filtering Electronic Messages
US20100030990A1 (en) * 2005-09-15 2010-02-04 Ntt Docomo, Inc. External memory management apparatus and external memory management method
US8132262B2 (en) 2005-09-15 2012-03-06 Ntt Docomo, Inc. External memory management apparatus and external memory management method
US20070067321A1 (en) * 2005-09-19 2007-03-22 Bissett Nicholas A Method and system for locating and accessing resources
US8095940B2 (en) 2005-09-19 2012-01-10 Citrix Systems, Inc. Method and system for locating and accessing resources
US7779034B2 (en) 2005-10-07 2010-08-17 Citrix Systems, Inc. Method and system for accessing a remote file in a directory structure associated with an application program executing locally
US20070083522A1 (en) * 2005-10-07 2007-04-12 Nord Joseph H Method and a system for responding locally to requests for file metadata associated with files stored remotely
US20070083655A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Methods for selecting between a predetermined number of execution methods for an application program
US20070083501A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Method and system for accessing a remote file in a directory structure associated with an application program executing locally
US8131825B2 (en) 2005-10-07 2012-03-06 Citrix Systems, Inc. Method and a system for responding locally to requests for file metadata associated with files stored remotely
US8051298B1 (en) * 2005-11-29 2011-11-01 Sprint Communications Company L.P. Integrated fingerprinting in configuration audit and management
US20070130167A1 (en) * 2005-12-02 2007-06-07 Citrix Systems, Inc. Systems and methods for providing authentication credentials across application environments
US7685298B2 (en) 2005-12-02 2010-03-23 Citrix Systems, Inc. Systems and methods for providing authentication credentials across application environments
US8959642B2 (en) 2005-12-28 2015-02-17 Websense, Inc. Real time lockdown
US9230098B2 (en) 2005-12-28 2016-01-05 Websense, Inc. Real time lockdown
US8453243B2 (en) * 2005-12-28 2013-05-28 Websense, Inc. Real time lockdown
US20070150956A1 (en) * 2005-12-28 2007-06-28 Sharma Rajesh K Real time lockdown
US8438543B2 (en) 2006-05-23 2013-05-07 International Business Machines Corporation Discovering multi-component software products
US20080235664A1 (en) * 2006-05-23 2008-09-25 Giancarlo Carbone Method, system and computer program for discovering multi-component software products
US8010947B2 (en) 2006-05-23 2011-08-30 International Business Machines Corporation Discovering multi-component software products based on weighted scores
US9723018B2 (en) 2006-07-10 2017-08-01 Websense, Llc System and method of analyzing web content
US9680866B2 (en) 2006-07-10 2017-06-13 Websense, Llc System and method for analyzing web content
US20080010368A1 (en) * 2006-07-10 2008-01-10 Dan Hubbard System and method of analyzing web content
US8020206B2 (en) 2006-07-10 2011-09-13 Websense, Inc. System and method of analyzing web content
US9003524B2 (en) 2006-07-10 2015-04-07 Websense, Inc. System and method for analyzing web content
US8615800B2 (en) 2006-07-10 2013-12-24 Websense, Inc. System and method for analyzing web content
US8978140B2 (en) 2006-07-10 2015-03-10 Websense, Inc. System and method of analyzing web content
US7567984B1 (en) * 2006-08-31 2009-07-28 Symantec Operating Corporation Operating system and application deployment based on stored user state and organizational policy
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
US8881277B2 (en) 2007-01-09 2014-11-04 Websense Hosted R&D Limited Method and systems for collecting addresses for remotely accessible information sources
US20100154058A1 (en) * 2007-01-09 2010-06-17 Websense Hosted R&D Limited Method and systems for collecting addresses for remotely accessible information sources
US20100217771A1 (en) * 2007-01-22 2010-08-26 Websense Uk Limited Resource access filtering system and database structure for use therewith
US8250081B2 (en) 2007-01-22 2012-08-21 Websense U.K. Limited Resource access filtering system and database structure for use therewith
US8938773B2 (en) 2007-02-02 2015-01-20 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US20080307489A1 (en) * 2007-02-02 2008-12-11 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US9609001B2 (en) 2007-02-02 2017-03-28 Websense, Llc System and method for adding context to prevent data leakage over a computer network
US8015174B2 (en) 2007-02-28 2011-09-06 Websense, Inc. System and method of controlling access to the internet
US8640215B2 (en) * 2007-03-23 2014-01-28 Microsoft Corporation Secure isolation of application pools
US20080235790A1 (en) * 2007-03-23 2008-09-25 Microsoft Corporation Secure isolation of application pools
US20080282354A1 (en) * 2007-05-07 2008-11-13 Microsoft Corporation Access control based on program properties
US8239954B2 (en) * 2007-05-07 2012-08-07 Microsoft Corporation Access control based on program properties
US8799388B2 (en) 2007-05-18 2014-08-05 Websense U.K. Limited Method and apparatus for electronic mail filtering
US20100217811A1 (en) * 2007-05-18 2010-08-26 Websense Hosted R&D Limited Method and apparatus for electronic mail filtering
US9473439B2 (en) 2007-05-18 2016-10-18 Forcepoint Uk Limited Method and apparatus for electronic mail filtering
US8244817B2 (en) 2007-05-18 2012-08-14 Websense U.K. Limited Method and apparatus for electronic mail filtering
US9021494B2 (en) 2007-10-20 2015-04-28 Citrix Systems, Inc. Method and system for communicating between isolation environments
US9009720B2 (en) 2007-10-20 2015-04-14 Citrix Systems, Inc. Method and system for communicating between isolation environments
US8171483B2 (en) 2007-10-20 2012-05-01 Citrix Systems, Inc. Method and system for communicating between isolation environments
US9009721B2 (en) 2007-10-20 2015-04-14 Citrix Systems, Inc. Method and system for communicating between isolation environments
US20090172160A1 (en) * 2008-01-02 2009-07-02 Sepago Gmbh Loading of server-stored user profile data
US8407784B2 (en) 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9495539B2 (en) 2008-03-19 2016-11-15 Websense, Llc Method and system for protection against information stealing software
US20090241173A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US20090241197A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. System and method for analysis of electronic information dissemination events
US20090241187A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US20090241196A1 (en) * 2008-03-19 2009-09-24 Websense, Inc. Method and system for protection against information stealing software
US9455981B2 (en) 2008-03-19 2016-09-27 Forcepoint, LLC Method and system for protection against information stealing software
US9130986B2 (en) 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US8370948B2 (en) 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US8959634B2 (en) 2008-03-19 2015-02-17 Websense, Inc. Method and system for protection against information stealing software
US20090265451A1 (en) * 2008-04-17 2009-10-22 E.S.I. Software Ltd. Assisted application definition
US8397290B2 (en) * 2008-06-27 2013-03-12 Microsoft Corporation Granting least privilege access for computing processes
US20090328180A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Granting Least Privilege Access For Computing Processes
US9378282B2 (en) 2008-06-30 2016-06-28 Raytheon Company System and method for dynamic and real-time categorization of webpages
US20100115615A1 (en) * 2008-06-30 2010-05-06 Websense, Inc. System and method for dynamic and real-time categorization of webpages
US8149431B2 (en) 2008-11-07 2012-04-03 Citrix Systems, Inc. Systems and methods for managing printer settings in a networked computing environment
US20100118330A1 (en) * 2008-11-07 2010-05-13 Ricardo Fernando Feijoo Systems and Methods for Managing Printer Settings in a Networked Computing Environment
US8544083B2 (en) * 2009-02-19 2013-09-24 Microsoft Corporation Identification security elevation
US20100212008A1 (en) * 2009-02-19 2010-08-19 Microsoft Corporation Identification Security Elevation
US9043889B2 (en) * 2009-04-15 2015-05-26 International Business Machines Corporation Method and apparatus for secure and reliable computing
US20130185796A1 (en) * 2009-04-15 2013-07-18 International Business Machines Corporation Method and apparatus for secure and reliable computing
US8326943B2 (en) 2009-05-02 2012-12-04 Citrix Systems, Inc. Methods and systems for launching applications into existing isolation environments
US20100281102A1 (en) * 2009-05-02 2010-11-04 Chinta Madhav Methods and systems for launching applications into existing isolation environments
US8090797B2 (en) 2009-05-02 2012-01-03 Citrix Systems, Inc. Methods and systems for launching applications into existing isolation environments
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US9692762B2 (en) 2009-05-26 2017-06-27 Websense, Llc Systems and methods for efficient detection of fingerprinted data and information
US20110035805A1 (en) * 2009-05-26 2011-02-10 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US20110209139A1 (en) * 2010-02-23 2011-08-25 Lutz Dominick Application platform
US9251312B2 (en) * 2010-02-23 2016-02-02 Siemens Aktiengesellschaft Application platform
US9733929B1 (en) * 2010-07-20 2017-08-15 Symantec Corporation Systems and methods for restoring applications
US20130013614A1 (en) * 2011-07-07 2013-01-10 1E Limited Identifying Software
US8463792B2 (en) * 2011-07-07 2013-06-11 1E Limited Identifying software
US8489616B2 (en) * 2011-07-07 2013-07-16 1E Limited Identifying software
US9118686B2 (en) 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US9773102B2 (en) 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US9679130B2 (en) 2011-09-09 2017-06-13 Microsoft Technology Licensing, Llc Pervasive package identifiers
US8990561B2 (en) * 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US10469622B2 (en) 2011-09-12 2019-11-05 Microsoft Technology Licensing, Llc Platform-enabled proximity service
WO2013115493A1 (en) * 2012-02-02 2013-08-08 Samsung Electronics Co., Ltd. Method and apparatus for managing an application in a mobile electronic device
US20130247177A1 (en) * 2012-03-14 2013-09-19 Samsung Electronics Co., Ltd Apparatus and method of controlling permission to applications in a portable terminal
US9372983B2 (en) * 2012-03-14 2016-06-21 Samsung Electronics Co., Ltd. Apparatus and method of controlling permission to applications in a portable terminal
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
US10044715B2 (en) 2012-12-21 2018-08-07 Forcepoint Llc Method and apparatus for presence based resource management
US9117054B2 (en) 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
US10044695B1 (en) * 2014-09-02 2018-08-07 Amazon Technologies, Inc. Application instances authenticated by secure measurements
US9491111B1 (en) 2014-09-03 2016-11-08 Amazon Technologies, Inc. Securing service control on third party hardware
US9584517B1 (en) * 2014-09-03 2017-02-28 Amazon Technologies, Inc. Transforms within secure execution environments
US9800559B2 (en) 2014-09-03 2017-10-24 Amazon Technologies, Inc. Securing service control on third party hardware
US9577829B1 (en) 2014-09-03 2017-02-21 Amazon Technologies, Inc. Multi-party computation services
US9521140B2 (en) 2014-09-03 2016-12-13 Amazon Technologies, Inc. Secure execution environment services
US9442752B1 (en) 2014-09-03 2016-09-13 Amazon Technologies, Inc. Virtual secure execution environments
US10061915B1 (en) 2014-09-03 2018-08-28 Amazon Technologies, Inc. Posture assessment in a secure execution environment
US10079681B1 (en) 2014-09-03 2018-09-18 Amazon Technologies, Inc. Securing service layer on third party hardware
US9754116B1 (en) 2014-09-03 2017-09-05 Amazon Technologies, Inc. Web services in secure execution environments
US10318336B2 (en) 2014-09-03 2019-06-11 Amazon Technologies, Inc. Posture assessment in a secure execution environment
US10447812B2 (en) * 2015-06-05 2019-10-15 Apple Inc. On demand resources
US11818224B2 (en) * 2015-06-05 2023-11-14 Apple Inc. On demand resources
US20160357544A1 (en) * 2015-06-05 2016-12-08 Apple Inc. On demand resources
US11088993B2 (en) 2016-05-11 2021-08-10 Oracle International Corporation Policy enforcement point for a multi-tenant identity and data security management cloud service
US10693861B2 (en) 2016-05-11 2020-06-23 Oracle International Corporation Task segregation in a multi-tenant identity and data security management cloud service
US10848543B2 (en) 2016-05-11 2020-11-24 Oracle International Corporation Security tokens for a multi-tenant identity and data security management cloud service
US10878079B2 (en) 2016-05-11 2020-12-29 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
US10721237B2 (en) 2016-08-05 2020-07-21 Oracle International Corporation Hierarchical processing for a virtual directory system for LDAP to SCIM proxy service
US10735394B2 (en) 2016-08-05 2020-08-04 Oracle International Corporation Caching framework for a multi-tenant identity and data security management cloud service
US20190155597A1 (en) * 2016-08-05 2019-05-23 Oracle International Corporation Zero Down Time Upgrade for a Multi-Tenant Identity and Data Security Management Cloud Service
US11356454B2 (en) 2016-08-05 2022-06-07 Oracle International Corporation Service discovery for a multi-tenant identity and data security management cloud service
US11601411B2 (en) 2016-08-05 2023-03-07 Oracle International Corporation Caching framework for a multi-tenant identity and data security management cloud service
US10579367B2 (en) * 2016-08-05 2020-03-03 Oracle International Corporation Zero down time upgrade for a multi-tenant identity and data security management cloud service
US10791087B2 (en) 2016-09-16 2020-09-29 Oracle International Corporation SCIM to LDAP mapping using subtype attributes

Also Published As

Publication number Publication date
CN1617099A (en) 2005-05-18
US20050091192A1 (en) 2005-04-28
JP2005129063A (en) 2005-05-19
KR20050039634A (en) 2005-04-29
US20050091655A1 (en) 2005-04-28
EP1526454A3 (en) 2006-08-16
EP1526454A2 (en) 2005-04-27

Similar Documents

Publication Publication Date Title
US20050091535A1 (en) Application identity for software products
EP1526429A2 (en) Operating system resource protection
US8539481B2 (en) Using virtual hierarchies to build alternative namespaces
US6931544B1 (en) Method and apparatus for executing multiple JAVA(™) applications on a single JAVA(™) virtual machine
US8312459B2 (en) Use of rules engine to build namespaces
US6317868B1 (en) Process for transparently enforcing protection domains and access control as well as auditing operations in software components
US8001596B2 (en) Software protection injection at load time
US8646044B2 (en) Mandatory integrity control
US7788637B2 (en) Operating system process identification
US8484641B2 (en) Implementing a versioned virtualized application runtime environment
US20070289019A1 (en) Methodology, system and computer readable medium for detecting and managing malware threats
US8200952B2 (en) Platform authentication via a transparent second factor
JP2005327239A (en) Security-related programming interface
WO2009148647A2 (en) Centralized enforcement of name-based computer system security rules
Long et al. Java coding guidelines: 75 recommendations for reliable and secure programs
US7155703B2 (en) Virtual method protection
US7770202B2 (en) Cross assembly call interception
US7624131B2 (en) Type restriction and mapping for partial materialization
US20150113545A1 (en) Modified jvm with multi-tenant application domains and class differentiation
US20050172286A1 (en) Hosted code runtime protection
US7996841B2 (en) Building alternative views of name spaces
US9798558B2 (en) Modified JVM with multi-tenant application domains and class differentiation
Paul et al. Comparing Java and. NET security: Lessons learned and missed
US7587594B1 (en) Dynamic out-of-process software components isolation for trustworthiness execution
EP2431897A1 (en) Inter-process interference elimination

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAVALAM, JUDE JACOB;NOONAN, TIMOTHY D.;TSURYK, VALERIY;AND OTHERS;REEL/FRAME:015105/0135

Effective date: 20040615

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014